Contact Us Today! (215) 853-2266

Bardissi Enterprises Blog

Bardissi Enterprises has been serving the Hatfield area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

Making the Switch from Apple to Android? Be Prepared!

Making the Switch from Apple to Android? Be Prepared!

With so many options that don’t cost $800, the Android mobile OS gains more customers every day. If you were a dedicated iPhone user that is looking to switch to Android, you have to be cognizant of the things you will need to ensure that you are able to transfer the information you need, and be able to seamlessly pick up your new device without missing a beat. Here are some issues you should consider:

Continue reading
0 Comments

Tablet Battle: Galaxy Tab S3 vs iPad Pro

Tablet Battle: Galaxy Tab S3 vs iPad Pro

Two of the primary developers of tablets--Apple and Samsung--have created two of the most popular devices out there: the iPad Pro and the Galaxy Tab S3. If you’re in need of a tablet, we can help you go over your options so that you choose the one that best suits your needs.

Continue reading
0 Comments

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

Apple Stands Up to the FBI: Legal Battle Ensues

b2ap3_thumbnail_fbi_and_apple_400.jpgThere’s no questioning Apple’s dedication to the advancement of technology, especially over the past few decades. With the iPhone being the first of many commercially available smartphones, Apple has always been at the forefront of exciting consumer technology developments. Now, however, their most important decision yet may come in the form of a face-off with the FBI.

Continue reading
0 Comments

Windows Phone vs. iOS vs. Android: The Mobile Computing War Rages On!

b2ap3_thumbnail_apple_microsoft_lag_behind_in_mobile_400.jpgOf all the computer company rivalries going on, one of the largest and most well known is Apple vs. Microsoft. The storied competition between these two software giants has driven innovation forward for more than thirty years. Today, the frontlines of this battle take place between the two company's mobile divisions, and now there's a third major competitor in the mix.

Continue reading
0 Comments

Motion’s C5 MCA and F5 Semi-Rugged Tablet PC Enhance Mobile Workforce Productivity with Upgrades, New Peripherals

Severity: High

1 July, 2008

Summary:

§ These vulnerabilities affect: OS X 10.4.x (Tiger) and OS X 10.5.x (Leopard), both client and server versions; as well as Safari 3.x for OS X 10.4.x

§ How an attacker exploits them: Multiple vectors of attack, including enticing one of your users into visiting a malicious web site

§ Impact: Various results; in the worst case, attacker executes code on your user’s computer, potentially gaining control of your user’s computer

§ What to do: OS X administrators should download, test and install Security Update 2008-004, Mac OS X 10.5.4, and Safari 3.1.2

Continue reading
0 Comments

OS X 10.5.3 Fixes Over 40 Security Vulnerabilities

Severity: High

28 May, 2008

Summary:

  • These vulnerabilities affect: OS X 10.4.x (Tiger) and OS X 10.5.x (Leopard), both client and server versions
  • How an attacker exploits them: Multiple vectors of attack, including enticing one of your users into visiting a URL or web site
  • Impact: Various results; in the worst case, attacker executes code on your user’s computer, potentially gaining control of your user’s computer
  • What to do: OS X administrators should download, test and install Security Update 2008-003 / Mac OS X 10.5.3

Exposure:

Today, Apple released a security update fixing at least 41 (number based on CVE-IDs) security issues in software packages that ship as part of OS X, including Apache, iCal, and Mail. Some of these vulnerabilities allow attackers to execute code on your OS X machines, so we rate this update Critical. Apply it as soon as you can. Three of the vulnerabilities which have been fixed are:

Continue reading
0 Comments

Apple Fixes Eleven Security Holes in QuickTime

Severity: High

3 April, 2008

Summary:

  • This vulnerability affects: QuickTime 7.4.x for Mac and PC (and possibly earlier versions)
  • How an attacker exploits it: Multiple methods of attack; in the most common, users are enticed to download and play a malicious movie or image in QuickTime
  • Impact: Various results; in the worst case, an attacker executes code on your user’s computer, potentially gaining complete control of it
  • What to do: If you allow QuickTime (or iTunes), upgrade to 7.4.5 — otherwise, remove these applications from your company’s computers

Exposure:

Today, Apple released an alert fixing eleven vulnerabilities in their popular media player application, QuickTime. (Current versions of iTunes also ship with QuickTime; if your users have iTunes, they most likely have QuickTime.) These applications run on Windows and Macintosh computers, and both platforms are susceptible to exploitation of these security flaws. Apple’s alert specifies Vista and XP SP2 as the vulnerable versions of Windows.

The vulnerabilities relate to different processes in QuickTime. For example: How it opens a picture file, how it displays movie files, how it handles a movie’s media tracks, and so on. Some of these vulnerabilities allow attackers to execute any code they choose on your OS X machines, so we rate this update Critical. If you allow QuickTime, apply the update as soon as you can. Some of the vulnerabilities fixed include:

Continue reading
0 Comments

Thirteen Security Flaws Plague Safari 3 for OS X and Windows

Severity: Medium

18 March, 2008

Summary:

  • These vulnerabilities affect: Safari 3 for OS X and Windows
  • How an attacker exploits them: By enticing one of your users into visiting a malicious web site
  • Impact: Various results; in the worst case, attacker executes code on your user’s computer, with your user’s privileges
  • What to do: Install Safari 3.1
Continue reading
0 Comments

Gargantuan OS X Update Fixes Almost 100 Security Flaws

Severity: High

18 March, 2008

Summary:

  • These vulnerabilities affect: OS X 10.4.x (Tiger) and OS X 10.5.x (Leopard), both client and server versions
  • How an attacker exploits them: Multiple vectors of attack, including enticing one of your users into visiting a URL or web site
  • Impact: Various results; in the worst case, attacker executes code on your user’s computer, potentially gaining complete of your user’s computer
  • What to do: OS X administrators should download, test and install Security Update 2008-002
Continue reading
0 Comments

OS X Security Update Corrects More than 11 Vulnerabilities

Severity: High

11 February, 2008

Summary:

  • These vulnerabilities affect: OS X 10.4.11(Tiger) and OS X 10.5.x (Leopard), both client and server versions
  • How an attacker exploits them: Multiple vectors of attack, including enticing one of your users into visiting a malicious web site
  • Impact: Various results. In the worst case, attacker executes code on your user’s computer, with your users privileges
  • What to do: OS X 10.4.11 users should install Security Update 2008-001. OS X 10.5.x users should install version 10.5.2

Exposure:

Today, Apple released a security update fixing over 11 security issues in software packages that ship as part of OS X, including Mail, Launch Services, and Samba. Many of these vulnerabilities allow attackers to execute any code they choose on your OS X machines, so we rate this update Critical. Apply it as soon as you can. Some of the fixed vulnerabilities include:

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

Tip of the Week: Which Headphones are Right for Your Needs?
23 April 2018
I will recommend Plantronics Backbeat Pro 2 SE Noise cancelling Headset with it's Great features.
Gamification: Make Business Fun for Everyone
27 January 2017
The world is based on the games. There are many types of games as per the aussie essay writing servi...
Let's Talk Tablets
12 January 2017
The concept of tablet is far better than that of PC because you can bring them with you everywhere a...
Tip of the Week: Tweak Your Workday in These 4 Ways and See Major Results
12 January 2017
The only thing will I will say regarding this blog is that it is very helpful at least for me. As I ...
WatchGuard Releases Version 10.2.7 for WSM, Edge, Fireware, and Fireware Pro
23 December 2016
I really needed to know about the fireware but i was confused that where can i find information abou...