Announcements, updates, and items of interest
Good-bye, and thanks for all the…
After 50 years of serving Gainesville, Florida and the surrounding communities, the North-Central Florida Chapter of the Association of Information Technology Professionals is formally ceasing operations. The chapter has been in continuous operation since its original charter in July 1971 as a chapter of the Data Processing Management Association. In support of its educational mission, the local chapter of AITP hosted monthly in-person presentations where discussions were led by local information technology speakers. The chapter ...
AITP-NCFL News, February 4, 2022
Security
- Krebs On Security: How Phishers Are Slinking Their Links Into LinkedIn
- maketecheasier: Do I Need Antivirus Software If I Have Windows Defender?
- ComputerWorld: On building a better briefing
- CIO: A tsunami of IT project disasters is on the horizon
- Javascript In Plain English: 3 Good Habits for 15 Minutes a Day Could Change You as a Programmer
- InfoWorld: “Do More with R” video tutorials
- LinuxTeck: 16 ...
AITP-NCFL News, February 2, 2022
Security
- BleepingComputer: SEO poisoning pushes malware-laced Zoom, TeamViewer, Visual Studio installers
- TechRepublic: Kaspersky stopped more than 30,000 attempts to use the Log4Shell exploit in January
- BleepingComputer: Microsoft Defender now detects Android and iOS vulnerabilities
- CIO: Making a difference: IT leaders uplift their communities
- InformationWeek: How IT Managers Can Retain Talent in Today's Job Market
- maketecheasier: 12 Windows Apps You Should Uninstall Immediately
- Javascript In Plain English: How to Learn ALL Programming ...
AITP-NCFL News, January 31, 2022
Security
- Bleeping Computer: Researchers use GPU fingerprinting to track users online
- Bleeping Computer: Windows vulnerability with new public exploits lets you become admin
- Krebs On Security: Who Wrote the ALPHV/BlackCat Ransomware Strain?
- DZone: Nemo - The Ubuntu File Manager You Didn’t Know You Needed
- Robert Half: Strengthening Corporate Culture in the Age of Remote Work
- Information/Age: Extracting value from unstructured data with intelligent data management
- DZone: How ...
AITP-NCFL News, January 28, 2022
Security
- BleepingComputer: Hackers are taking over CEO accounts with rogue OAuth apps
- ZDNet: BlackCat ransomware targeting US, European retail, construction and transportation orgs
- Krebs On Security: Who Wrote the ALPHV/BlackCat Ransomware Strain?
- TechRepublic: Data Privacy Day: Security experts' tips for 2022
- InfoWorld: Slashing time to insight with unified data analytics
AITP-NCFL News, January 26, 2022
Security
- Bleeping Computer: Let's Encrypt is revoking lots of SSL certificates in two days
- Bleeping Computer: Linux system service bug gives root on all major distros, exploit released
- CIO: MassMutual’s Gareth Ross: The hardest work of analytics “sits around the edges”
- JavaScript In Plain English: What Do Highly Effective Programmers Look Like?
- Red Hat: How to get started with the Vi editor
- Robert Half: 5 of the ...
AITP-NCFL News, January 24, 2022
Security
- Bleeping Computer: Over 90 WordPress themes, plugins backdoored in supply chain attack
- betanews: Governing the ungovernable: Why cybersecurity must adapt to identity sprawl
- Computerworld: 16 ways to speed up Windows 10
- Javascript In Plain English: Top 10 JavaScript Animation Libraries
- CIO: What is data architecture? A framework for managing data
- Robert Half: How To Find Remote Jobs Now
- InfoWorld: So you want to be a Web3 ...
AITP-NCFL News, January 20, 2022
Security
- BleepingComputer: Red Cross cyberattack exposes data of 515,000 people seeking missing family
- 9to5linux: New Linux Kernel Vulnerability Patched in All Supported Ubuntu Systems, Update Now
- BleepingComputer: CISA urges US orgs to prepare for data-wiping cyberattacks
- BleepingComputer: Office 365 phishing attack impersonates the US Department of Labor
- CIO: Ericsson’s Tony Caesar: It’s not about clocking hours, it’s about clocking results
- InformationWeek: Data Fabrics: Six Top Use Cases
- The Register: COVID-19 was ...
AITP-NCFL News, January 18, 2022
Security
- BleepingComputer: Microsoft releases emergency fixes for Windows Server, VPN bugs
- CIO: 8 top priorities for CIOs in 2022
- DZone: Top 5 Python Frameworks, Libraries, and Packages for Web Development
- Robert Half: 5 Key Benefits of Hiring Remote Workers
- InfoWorld: A new kind of old-school testing
- Red Hat: 3 tools for troubleshooting packet filtering
- TechRepublic: 4 non-coding jobs every IT team needs
- Javascript In Plain English: 10 ...
AITP-NCFL News, January 14, 2022
Security
- BleepingComputer: Microsoft pulls new Windows Server updates due to critical bugs
- BleepingComputer: Android users can now disable 2G to block Stingray attacks
- DZone: 8 Top Metrics for Measuring Your Technical Debt in 2022
- CIO: The savvy CIO’s secret weapon: Your IT team
- CIO: 7 ways to breathe new life into your IT leadership career
- DZone: Testing in DevOps – The Basic and Critical Things You Need ...
AITP-NCFL News, January 10, 2022
Security
- BleepingComputer: SonicWall: Y2K22 bug hits Email Security, firewall products
- TechRepublic: URL parsing: A ticking time bomb of security exploits
- ZDNet: The IT skills gap is getting worse. Here are 10 ways you can avoid a crisis
- Javascript In Plain English: 7 Things Developers Can do When They Feel Stuck
- CIO: CIO as business partner: 4 prerequisites IT leaders must master
- Robert Half: 20 UX Designer Interview ...
AITP-NCFL News, January 7, 2022
Security
- BleepingComputer: NHS warns of hackers exploiting Log4Shell in VMware Horizon
- Information/Age: It’s time we changed how we approached data loss protection
- TechRepublic: In the new year, resolve to use less jargon and bring clarity to business conversations
- Information/Age: How is the role of the CTO evolving?
- TechRepublic: How to use keyboard shortcuts to make a split screen on macOS, iPadOS, Windows and Chrome OS
- betanews: 5 data warehouse myths that ...
AITP-NCFL News, January 5, 2022
Security
- BleepingComputer: First Microsoft Pluton-powered Windows 11 PCs unveiled at CES
- betanews: Microsoft releases emergency KB5010196 and KB5010215 updates to fix serious remote desktop problems in Windows Server
- InformationWeek: IT Job Skills 2022: What’s Hot, What’s Not?
- DZone: 7 Formats for Great Team Retrospectives
- Information/Age: Leading through uncertainty: seven characteristics of highly successful digital leaders
AITP-NCFL News, January 4, 2022
Security
- InformationWeek: 5 Cyber Resilience Lessons We Re-Learned in 2021 (But Will Probably Forget)
- DZone: Why Assessing Security Risk in Compute Lifecycle Development Should Be a Community Effort
- ars technica: Microsoft fixes harebrained Y2K22 Exchange bug that disrupted email worldwide
- ComputerWorld: How to bookmark Safari Tab groups (and other bookmark tips)
- TechRepublic: A new release of Rescuezilla is here to help you recover your backed-up da
- DZone: ...
AITP-NCFL News, January 3, 2022
Security
- Bleeping Computer: Don't copy-paste commands from webpages — you can get hacked
- Bleeping Computer: Microsoft releases emergency fix for Exchange year 2022 bug
- Computerworld: When biometrics can be outsmarted this way, we need to talk
- phoronix: Massive ~2.3k Patch Series Would Improve Linux Build Times 50~80% & Fix "Dependency Hell"
AITP-NCFL News, December 30 , 2021
Happy New Year from your friends at AITP-NCFL! Security
- BleepingComputer: Silent danger: One in five aged domains is malicious, risky, or unsafe
- BleepingComputer: T-Mobile says new data breach caused by SIM swap attacks
- BleepingComputer: Log4j 2.17.1 out now, fixes new remote code execution bug
- DZone: Importance of Data Discovery in Data Mesh Architecture
- JavaScript In Plain English: The Most Disgusting Thing I Have Ever Seen a Programmer Do
- Robert Half: 5 ...
AITP-NCFL News, December 24, 2021
Happy Holidays from your friends at AITP-NCFL! Security
- DZone: Privacy and Confidentiality in Security Testing
- phoronix: macOS 12.1 vs. Ubuntu vs. Clear Linux vs. Windows Benchmarks
- TechRepublic: 10 big data and analytics resolutions for 2022
- DEV: 10 things every software developer should know to stay productive
- DZone: Fighting Fragility With Property-Based Testing
- JavaScript In Plain English: When You Work Alone on a Project, You Should Take Special ...
AITP-NCFL News, December 23, 2021
Security
- BleepingComputer: Honeypot experiment reveals what hackers want from IoT devices
- DZone: Security Issues With WordPress
- BleepingComputer: Microsoft Azure App Service flaw exposed customer source code
- BleepingComputer: CISA releases Apache Log4j scanner to find vulnerable apps
- c|net: Yes, you can use Windows software on a Chromebook
- DZone: Are You Contributing to a Toxic Work Environment Without Realizing It?
- Robert Half: 7 Ways to Support Employee Career Advancement
- ...
AITP-NCFL News, December 22, 2021
Security
- betanews: Cybercriminals can penetrate 93 percent of company networks
- BleepingComputer: New stealthy DarkWatchman malware hides in the Windows Registry
- BleepingComputer: Microsoft warns of easy Windows domain takeover via Active Directory bugs
- Information/Age: What can bank robberies teach us about the need for physical cyber security?
- betanews: Businesses would be less likely to pay ransoms if payments had to be reported
AITP-NCFL News, December 17, 2021
Security
- BleepingComputer: Conti ransomware uses Log4j bug to hack VMware vCenter servers
- betanews: Nearly a quarter of employees are likely to fall for phishing attacks
- BleepingComputer: All Log4j, logback bugs we know so far and why you MUST ditch 2.15
- SecurityWeek: Google Says NSO Pegasus Zero-Click 'Most Technically Sophisticated Exploit Ever Seen'
- DEV: Cloud App Security: Top 10 Preventions Developers Must Know
- DEV: Is DataOps “DevOps For Data”?
- TechRepublic: Comparison tools ...
AITP-NCFL News, December 15, 2021
Security
- ZDNet: Second Log4j vulnerability discovered, patch already released
- ComputerWorld: Android security checkup: 16 steps to a safer phone
- Robert Half: 14 Effective Employee Retention Strategies
- CIODive: Is the security of legacy IT providers prompting a confidence crisis?
AITP-NCFL News, , 2021
Security
- BleepingComputer: Log4j: List of vulnerable products and vendor advisories
- BleepingComputer: Attackers can get root by crashing Ubuntu’s AccountsService
- DZone: XSS Attacks: Best Prevention
- CIO: What is a digital twin? A real-time, virtual representation
- Robert Half: Why Recruiting Metrics and KPIs Matter More Than Ever
- JavaScript In Plain English: 8 Signs That You Are a Fantastic Programmer
- DEV: Why TODOs and Jira tickets are not working anymore
- ...
AITP-NCFL News, , 2021
Security
- ZDNet: Log4j zero-day flaw: What you need to know and how to protect yourself
- BleepingComputer: Ukraine arrests 51 for selling data of 300 million people in US, EU
- BleepingComputer: Police arrests ransomware affiliate behind high-profile attacks
- BleepingComputer: Phishing attacks use QR codes to steal banking credentials
AITP-NCFL News, December 10, 2021
Security
- BleepingComputer: Massive attack against 1.6 million WordPress sites underway
- LunaSec: Log4Shell: RCE 0-day exploit found in log4j, a popular Java logging package
- BleepingComputer: Kali Linux 2021.4 released with 9 new tools, further Apple M1 support
- CIO: 3 steps to better data center risk management
- ZDNet: Developers are ready to quit their jobs. Here's what might convince them to stay
- ComputerWorld: The way to better collaboration: define the problem, craft a ...
AITP-NCFL News, December 8, 2021
Security
- BleepingComputer: Hackers infect random WordPress plugins to steal credit cards
- linuxlinks: Best Free and Open Source Alternatives to Autodesk EAGLE
- TechRepublic: TechRepublic's top checklist roundup
- phoronix: Microsoft Releases Performance Tools For Linux/Android
- DZone: Federated Learning: Collaborative Machine Learning With a Tutorial
- Robert Half: Job Skills to Include on Your Resume (With Examples!)
- DEV: How I self-hosted my own website analytics with Umami
- ...
AITP-NCFL News, December 7, 2021
Security
- ZDNet: Security: This new Firefox feature could stop zero-day flaws in their tracks
- betanews: Employee burnout puts business security at risk
- ZDNet: MuleSoft rolls out universal API management capabilities
- maketecheasier: How to Make an Image Transparent without Photoshop
- ByteXD: Find Large Files and Directories in Linux
- LiveScience: DeepMind cracks 'knot' conjecture that bedeviled mathematicians for decades
- ZDNet: 'The Beatles: Get Back' ...
AITP-NCFL News, December 6, 2021
Security
- BleepingComputer: Malicious Excel XLL add-ins push RedLine password-stealing malware
- DZone: Role of TechOps, DevOps, and NoOps in the SDLC
- TechRepublic: Do computer users really need blue light-filtering glasses?
- betanews: Meet the three amigos of data: Governance, privacy and security
- Red Hat: Try 'labs as a service' to learn Linux in the cloud
- TechRepublic: Make your system admin job a lot easier: Learn automation with Microsoft PowerShell ...
AITP-NCFL News, December 3, 2021
Chapter News
- Two new presentations available on our YouTube site
- Chapter and Board meeting at 6:00 PM Tuesday, December 6, at Peppers (7750 Newberry Rd). Reserve now!
- Krebs On Security: Ubiquiti Developer Charged With Extortion, Causing 2020 “Breach”
- betanews: No time like the present for running an ethical and effective phishing simulation
AITP-NCFL News, December 2, 2021
Security
- BleepingComputer: Nine WiFi routers used by millions were vulnerable to 226 flaws
- LinuxConfig: How to hash passwords on Linux
- The Register: On the first day of Christmas, my true love gave to me... a coding puzzle and it's a doozy
- DEV: What are database indexes?
- InfoWorld: “Do More with R” video tutorials ...
AITP-NCFL News, December 1, 2021
Security
- BleepingComputer: State-backed hackers increasingly use RTF injection for phishing
- ars technica: Thousands of AT&T customers in the US infected by new data-stealing malware
- TechRepublic: What is a scrum, and why should your teams use it?
- DEV: How to remember everything you learn in code
AITP-NCFL News, November 30, 2021
Security
- DZone: What Are the Five Steps of Ethical Hacking?
- DZone: When Big Data Goes Bad: Rehabilitating Data Quality
- TechRepublic: Whether you're writing COBOL or Go, this is how unit tests make your software better
- DZone: Improving Your Communication Skills as a Developer
- maketecheasier: Differences Between UEFI and BIOS, and Which One You Should Use?
- DZone: Debugging the Technical Interview - Methods and Cheating
AITP-NCFL News, November 29, 2021
Security
- BleepingComputer: New Windows 10 zero-day gives admin rights, gets unofficial patch
- Krebs On Security: The Internet is Held Together With Spit & Baling Wire
- BleepingComputer: Interpol arrests over 1,000 suspects linked to cyber crime
- DZone: 10 Ways to Improve Code Reviews
- DZone: The 10 Commandments for Performing a Data Science Project
- Robert Half: 6 Tips to Help Small Businesses Boost Employee Morale
- CIODive: What high turnover means for software development ...
AITP-NCFL News, November 24, 2021
Happy Thanksgiving! Security
- BleepingComputer: Threat actors find and compromise exposed services in 24 hours
- ComputerWorld: Apple pulls no punches in lawsuit against 'amoral' NSO Group
- BleepingComputer: FBI warns of phishing targeting high-profile brands' customers
- CIO: Three concepts to embrace for effective digitally driven innovation
- InformationWeek: How to Maintain Team Productivity Without Being Viewed as a Scrooge
- DZone: How Technical Operations Can Build on the Success of Data Science Notebooks
AITP-NCFL News, November 23, 2021
Security
- TechRepublic: Smishing kicks into high gear as scammers use package delivery texts as clickbait
- BleepingComputer: New Windows zero-day with public exploit lets you become an admin
- Krebs On Security: Arrest in ‘Ransom Your Employer’ Email Scheme
- The Record: Attackers don’t bother brute-forcing long passwords, Microsoft engineer says
- BleepingComputer: Exploit released for Microsoft Exchange RCE bug, patch now
- LinuxLinks: Best Free and Open Source Alternatives to Adobe Lightroom
- DZone: How to ...
AITP-NCFL News, November 22, 2021
Security
- BleepingComputer: US SEC warns investors of ongoing govt impersonation attacks
- Krebs On Security: The ‘Zelle Fraud’ Scam: How it Works, How to Fight Back
- TechRepublic: 8 advanced threats Kaspersky predicts for 2022
- Robert Half: 4 Tips for Hiring in a Tight Labor Market
- CIODive: Most employees waste 8 hours a week finding data, survey said
AITP-NCFL News, November 19, 2021
Security
- BleepingComputer: US regulators order banks to report cyberattacks within 36 hours
- InformationWeek: 8 Tips for Creating a Cybersecurity Culture
- InfoWorld: Security is the Achilles’ heel of multicloud
- ZDNet: Answer These Questions Before You Upgrade
- TechRepublic: Top 5 things to know about data intelligence
- DEV: Why we migrated to TypeScript after all
- CIODive: 5 questions to ask before buying AI products
- DZone: Reverse Debugging - What You ...
AITP-NCFL News, November 18, 2021
Security
- ZDNet: This mysterious malware could threaten millions of routers and IoT devices
- Krebs On Security: Tech CEO Pleads to Wire Fraud in IP Address Scheme
- DZone: Top 5 Recent Data Breaches: Causes and Lessons
- DZone: 15 Places to Find Free Datasets for Your Data Science Projects
- Red Hat: 3 types of monitoring and some open source tools to get started
- TechRepublic: Latest Github survey finds developers like automation, reusing code ...
AITP-NCFL News, November 17, 2021
Security
- BleepingComputer: CISA releases cybersecurity response plans for federal agencies
- ZDNet: Ransomware gangs are now rich enough to buy zero-day flaws, say researchers
- ComputerWorld: A 20-second tweak for smarter, simpler Android security
- TechRepublic: Your weak passwords can be cracked in less than a second
AITP-NCFL News, November 16, 2021
Security
- BleepingComputer: New Microsoft emergency updates fix Windows Server auth issues
- ZDNet: Emotet, once the world's most dangerous malware, is back
- TechRepublic: Malicious shopping websites surge in number in advance of Black Friday
- DZone: To My Programmer Self 20 Years Ago: Do These 4 Things More
- maketecheasier: Octoparse Review: Web Scraping Made Easy
- The Register: Wondering what to do with those empty offices? How about a data centre?
- Robert Half: 4 ...
AITP-NCFL News, November 15, 2021
Security
- BleepingComputer: Microsoft warns of surge in HTML smuggling phishing attacks
- ars technica: DDR4 memory protections are broken wide open by new Rowhammer technique
- Krebs On Security: Hoax Email Blast Abused Poor Coding in FBI Website
- The Verge: Microsoft blocks EdgeDeflector to force Windows 11 users into Edge
- betanews: How old, incomplete, and inaccurate data can hurt businesses
- DZone: Understanding the relationships between SLO, SLI, and SRE ...
AITP-NCFL News, Novermber 12, 2021
Security
- BleepingComputer: Zero-day bug in all Windows versions gets free unofficial patch
- ZDNet: Google warns hackers used macOS zero-day flaw, could capture keystrokes, screengrabs
- Krebs On Security: SMS About Bank Fraud as a Pretext for Voice Phishing
- Information/Age: Data immutability: the forgotten component of defence in depth
- ZDNet: Managers aren't worried about keeping their IT workers happy. That's bad for everyone
- LinuxLinks: Best Free and Open Source Alternatives to Microsoft Publisher ...
AITP-NCFL News, November 10, 2021
Security
- BleepingComputer: These invisible characters could be hidden backdoors in your JS code
- ZDNet: Exchange Server bug: Patch now, but multi-factor authentication might not stop these attacks, warns Microsoft
- Robert Half: Rethinking the 9-to-5 (infographic)
- InfoWorld: How to automate QA testing of SaaS and low-code applications
AITP-NCFL News, November 9, 2021
Security
- BleepingComputer: REvil ransomware affiliates arrested in Romania and Kuwait
- NN/g: Campbell’s Law: The Dark Side of Metric Fixation
- linuxiac: PHPStan Reached Version 1.0 After 6 Years of Development
- The Register: Why machine-learning chatbots find it difficult to respond to idioms, metaphors, rhetorical questions, sarcasm
AITP-NCFL News, November 8, 2021
Security
- BleepingComputer: State hackers breach defense, energy, healthcare orgs worldwide
- TechRepublic: Cybersecurity: Track data activity before "unusual" becomes dangerous
- maketecheasier: Modem vs. Router: What’s the Difference?
- DEV: Code Review: A Comprehensive Checklist
- Brian Di Croce: Slow Down, Finish Faster
- DZone: Using the Notion API to Build a Content Management System
- InformationWeek: 10 Top Skills for Cloud Computing
- SecurityWeek: How to Spot an Effective Security Practitioner
AITP-NCFL News, November 5, 2021
Security
- SecurityWeek: US Offers $10 Million Bounty in Hunt for DarkSide Ransomware Operators
- Krebs On Security: ‘Tis the Season for the Wayward Package Phish
- maketecheasier: 13 Free Alternatives to Microsoft Visio
- ZDNet: Top programming languages: Most popular and fastest growing choices for developers
- Red Hat: 4 soft skills for successful sysadmins
- DEV: SQL Basics for Beginners
- TechCrunch: Kyndryl officially launches as IBM spins ...
AITP-NCFL News, November 4, 2021
Security
- TechRepublic: Data and the policies that protect it: 4 essential plans to have in place
- maketecheasier: How to Customize Your Mac in Monterey
- Red Hat: Tips for packaging your Linux software with RPM
- DEV: Beginner’s guide to JavaScript’s map()
- CIO: Kyndryl eyes new markets in spin-off from IBM
- The Register: Waterfox: A Firefox fork that could teach Mozilla a lesson ...
AITP-NCFL News, November 3, 2021
Security
- Motherboard: The Booming Underground Market for Bots That Steal Your 2FA Codes
- Krebs On Security: The ‘Groove’ Ransomware Gang Was a Hoax
- TechRepublic: 5 open-source kanban boards to help you get and stay on task
- InfoWorld: Cloud costs a lot of money
- Information/Age: Bridging the ‘IT, security and developer’ divide to deliver innovation at speed
AITP-NCFL News, November 2, 2021
Security
- Bleeping Computer: MITRE shares list of most dangerous hardware weaknesses
- Bleeping Computer: Android November patch fixes actively exploited kernel bug
- ZDNet: The secret to being more creative at work? Why timing could be the key
- CIO: 9 tips for selecting and implementing an ERP system
- maketecheasier: How to Find the Maximum RAM Capacity of Your Computer
- TechRepublic: 3 ways to quickly deal with blank cells in an Excel sheet