Chicago IT Support & Cyber Security | Forward Technologies

Chicago-based Forward Technologies delivers IT support and cyber security to businesses in the Chicago area and nationwide.

  • Home
  • Services
    • Outsourced IT Support
    • DMARC Email Security
    • Development
      • Web Development & Facelifts
      • CustomView: Plugin for WordPress
    • Data Recovery Service
    • PPC Marketing Services
    • SEO Services
  • Email Security
    • SPF Basics
    • DKIM Basics
    • DMARC Basics
    • Email Security Consulting
  • Data Recovery Service
  • Blog
  • Contact Us

Microsoft Adds Passkey Sign-Ins to Windows, Expanding Phishing-Resistant Authentication

March 11, 2026 by Edward Silha

Microsoft Windows login screen using passkey authentication through Microsoft Entra with Windows Hello biometric sign-in.Microsoft is expanding passwordless security across Windows by introducing passkey authentication through Microsoft Entra. The new capability allows users to sign in to Entra-protected resources using Windows Hello instead of traditional passwords, adding stronger resistance against phishing attacks and credential theft.

The feature will roll out as an opt-in public preview starting in mid-March 2026 and continuing through late April for global Microsoft 365 tenants. Government cloud environments will receive the preview shortly after, with deployments scheduled between mid-April and mid-May. Once enabled, the update allows organizations to adopt passkeys as an authentication method on Windows devices. [Read more…]

Filed Under: Blog, Cybersecurity, Tech In General Tagged With: FIDO2, identity security, Microsoft, Microsoft 365 security, Microsoft Entra, passkeys, passwordless authentication, phishing resistance, Windows authentication, Windows Hello

AirSnitch Exposes a Deep Flaw in Wi-Fi Security, Undermining Client Isolation Worldwide

February 26, 2026 by Edward Silha

Cartoon-style illustration of two laptops on the same Wi-Fi network with a hidden device intercepting traffic between them, symbolizing the AirSnitch client isolation flaw

That “Safe” Guest Wi-Fi Network May Not Be Isolating Anyone

Wi-Fi has become the invisible wiring of modern life. Billions of devices rely on it every day, from phones and laptops to smart TVs and industrial systems. That scale has always made wireless security a high-stakes problem. Now new research shows that a fundamental protection built into nearly every router can be quietly bypassed, allowing attackers on the same network to intercept and tamper with traffic that was supposed to be isolated and protected. [Read more…]

Filed Under: Blog, Cybersecurity, Tech In General Tagged With: AirSnitch, ASUS, Cisco, client isolation, D-Link, DNS poisoning, guest Wi-Fi, machine-in-the-middle attack, Netgear, network security, public Wi-Fi, RADIUS, TP-Link, Ubiquiti, Wi-Fi security, wireless vulnerabilities, WPA2, WPA3, zero trust security

The Quiet Race to Reinvent Encryption Before Quantum Computers Break It

February 20, 2026 by Edward Silha

Reinventing encryption in the quantum ageFor decades, modern encryption has rested on a simple assumption. Some math problems take so long to solve that no practical computer can crack them in a useful timeframe. That assumption built online banking, secure email, VPN tunnels, software signing, and almost every digital transaction that powers business and government today.

Quantum computing threatens to tear that assumption apart. [Read more…]

Filed Under: Blog, Cybersecurity Tagged With: crypto agility, cybersecurity trends, data security, elliptic curve cryptography, hybrid encryption, NIST, post-quantum cryptography, quantum computing, RSA encryption, TLS certificates

Why Scaling Large Language Models Won’t Give Us AGI

January 19, 2026 by Edward Silha

Illustration of a chatbot made of text blocks facing a human brain with gears and arrows, representing prediction versus real understandingWe’ve spent the last few years watching language models get disturbingly good at sounding smart. They write coherent essays, debug code, explain quantum physics in simple terms. The experience is convincing enough that serious people have started talking about these systems as if they’re on the cusp of real intelligence, or already past it.

They’re not. And the gap matters more than the hype suggests.

Look, I get the appeal. When ChatGPT solves a tricky programming problem or writes a passable legal brief, it feels intelligent. But fluency isn’t understanding, and being really good at predicting the next word isn’t the same as knowing how the world actually works. [Read more…]

Filed Under: AI, Blog Tagged With: AGI, AI hype, AI research, artificial general intelligence, causal reasoning, GPT models, language models, machine learning limits

Google Quietly Lets Gmail Users Change Their Email Address Without Losing Their Account

December 26, 2025 by Edward Silha

A cartoon adult user looking embarrassed at an old Gmail address on a screen, with a refreshed modern address appearing beside it.Google is finally undoing one of Gmail’s longest standing frustrations. Users who have been stuck for years with outdated or embarrassing email addresses now have a way out that does not involve starting over. A newly updated Google support document confirms that Gmail accounts can now be assigned a new address while keeping the same account, inbox, and data intact. [Read more…]

Filed Under: Blog, Tech In General Tagged With: account management, email addresses, email security, Gmail, Gmail features, Google, Google accounts, Google Drive, Google Maps, YouTube

  • 1
  • 2
  • 3
  • …
  • 10
  • Next Page »

Social Media

  • Facebook
  • GitHub
  • LinkedIn
  • Periscope
  • Twitter

Forward Technologies
747 N LaSalle
STE 500B
Chicago, IL 60654
(312) 715-7806

Copyright © 2026 — Forward Technologies • All rights reserved. • Privacy Policy •