Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet IT Support Efficiency User Tips Malware Privacy Phishing Email Workplace Tips Computer Google IT Services Users Collaboration Hosted Solutions Quick Tips Ransomware Mobile Device Cybersecurity Microsoft Small Business Data Backup Workplace Strategy Communication VoIP Smartphones Android Saving Money Smartphone Business Management Mobile Devices communications Backup Data Recovery Passwords Managed Service Managed IT Services Social Media Microsoft Office Upgrade Browser Disaster Recovery Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Miscellaneous Gadgets Server Remote Work Managed Service Provider Windows Information Outsourced IT Current Events Encryption Spam Productivity Employee/Employer Relationship Holiday Windows 10 Government Office Data Management Business Continuity Compliance Blockchain Wi-Fi AI Training Business Technology Windows 10 Virtualization Data Security Apps Two-factor Authentication Mobile Office Bandwidth App Employer-Employee Relationship Vendor Mobile Device Management Chrome Gmail Budget Managed Services Voice over Internet Protocol Apple Networking How To BDR BYOD Computing Hacker Information Technology Avoiding Downtime Applications Access Control Office 365 Tip of the week Conferencing WiFi Operating System Computers Virtual Private Network Risk Management HIPAA Router Website Marketing Health Analytics Office Tips Augmented Reality Help Desk Retail Storage Password Bring Your Own Device Big Data Managed IT Services Healthcare Social Cooperation Free Resource Going Green Patch Management Save Money Project Management Windows 7 Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Microsoft 365 Solutions Display Printer Paperless Office Infrastructure Windows 11 IT Support Firewall Document Management Monitoring 2FA Excel The Internet of Things Scam Data loss Remote Workers Telephone iPhone Licensing Vulnerabilities Entertainment Robot Data Privacy Customer Relationship Management Images 101 Settings Printing Wireless Telephone System Content Filtering Multi-Factor Authentication Mobility Cost Management Hacking IT Management Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology Employees Computer Repair Integration Virtual Desktop Data storage LiFi User Tip Modem Mobile Security Processor Word Outlook Holidays Machine Learning Money Data Storage Smart Technology Supply Chain Humor Video Conferencing Managed Services Provider Professional Services Safety Maintenance Saving Time Virtual Machines Sports Antivirus Mouse Managed IT Service Administration Downloads Break Fix Scams Application Best Practice Browsers Smartwatch Alert Connectivity IT Buisness File Sharing Upload Procurement Dark Data Azure Hybrid Work Managed IT IBM Legal IT solutions Social Network Telework How To Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Business Growth CES Notifications IoT Communitications Travel Trends Supply Chain Management Techology Google Maps Customer Resource management FinTech Cortana Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Alt Codes Data Analysis Star Wars IT Assessment Competition Downtime Unified Threat Management Gamification Flexibility Staff Value Business Intelligence Unified Threat Management Hosted Solution Organization Social Networking Legislation Shortcuts Smart Devices Ransmoware Typing Fileless Malware Digital Security Cameras Content Remote Working Network Congestion Wearable Technology Memory Vendors Comparison Google Play Be Proactive Google Drive User Error User Health IT Knowledge Physical Security Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Directions Videos Point of Sale 5G Wasting Time Threats Specifications Security Cameras Workplace Strategies IP Address Google Docs Unified Communications Experience Trend Micro Running Cable Tech Support Internet Exlporer Software as a Service Fraud Meta Bitcoin Network Management Microchip Google Wallet Username Monitors Managing Costs Amazon Black Friday SSID Recovery eCommerce Laptop Websites Database Surveillance Virtual Assistant Outsource IT Hard Drives Windows 8 Domains Drones IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT SharePoint Proxy Server Reviews Electronic Medical Records Cookies Halloween Tactics Development Hotspot Transportation Small Businesses Refrigeration Public Speaking Lenovo Writing Mirgation Hypervisor Displays PowerPoint Lithium-ion battery Shopping Virtual Reality Nanotechnology Optimization Entrepreneur Scary Stories Private Cloud Addiction Language Employer/Employee Relationships Outsourcing Hacks Server Management Superfish Identity Theft Management PCI DSS Fun Chatbots Navigation Distributed Denial of Service Workplace Deep Learning Gig Economy Twitter Screen Reader Error Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Undo Education Regulations Compliance Social Engineering Identity Evernote Paperless Co-managed IT Bookmark Remote Computing Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care Mobile Computing Tablet Financial Data Search History Business Communications

Blog Archive