Chicago IT Support & Cyber Security | Forward Technologies

Chicago-based Forward Technologies delivers IT support and cyber security to businesses in the Chicago area and nationwide.

  • Home
  • Services
    • Outsourced IT Support
    • DMARC Email Security
    • Development
      • Web Development & Facelifts
      • CustomView: Plugin for WordPress
    • Data Recovery Service
    • PPC Marketing Services
    • SEO Services
  • Email Security
    • SPF Basics
    • DKIM Basics
    • DMARC Basics
    • Email Security Consulting
  • Data Recovery Service
  • Blog
  • Contact Us

AirSnitch Exposes a Deep Flaw in Wi-Fi Security, Undermining Client Isolation Worldwide

February 26, 2026 by Edward Silha

Cartoon-style illustration of two laptops on the same Wi-Fi network with a hidden device intercepting traffic between them, symbolizing the AirSnitch client isolation flaw

That “Safe” Guest Wi-Fi Network May Not Be Isolating Anyone

Wi-Fi has become the invisible wiring of modern life. Billions of devices rely on it every day, from phones and laptops to smart TVs and industrial systems. That scale has always made wireless security a high-stakes problem. Now new research shows that a fundamental protection built into nearly every router can be quietly bypassed, allowing attackers on the same network to intercept and tamper with traffic that was supposed to be isolated and protected. [Read more…]

Filed Under: Blog, Cybersecurity, Tech In General Tagged With: AirSnitch, ASUS, Cisco, client isolation, D-Link, DNS poisoning, guest Wi-Fi, machine-in-the-middle attack, Netgear, network security, public Wi-Fi, RADIUS, TP-Link, Ubiquiti, Wi-Fi security, wireless vulnerabilities, WPA2, WPA3, zero trust security

The Quiet Race to Reinvent Encryption Before Quantum Computers Break It

February 20, 2026 by Edward Silha

Reinventing encryption in the quantum ageFor decades, modern encryption has rested on a simple assumption. Some math problems take so long to solve that no practical computer can crack them in a useful timeframe. That assumption built online banking, secure email, VPN tunnels, software signing, and almost every digital transaction that powers business and government today.

Quantum computing threatens to tear that assumption apart. [Read more…]

Filed Under: Blog, Cybersecurity Tagged With: crypto agility, cybersecurity trends, data security, elliptic curve cryptography, hybrid encryption, NIST, post-quantum cryptography, quantum computing, RSA encryption, TLS certificates

Android Exploit Can Steal 2FA Codes Without Permissions

October 16, 2025 by Edward Silha

Cartoon-style illustration of an Android smartphone glowing in green and blue tones, with pixel fragments peeling off the screen to reveal a two-factor authentication code, symbolizing the Pixnapping attack stealing visual data.A new attack called Pixnapping can steal sensitive data from Android devices, without needing a single permission. The exploit targets visual data on-screen, including two-factor authentication codes, private messages, and location histories. It works by quietly measuring how long it takes to render specific pixels. If that sounds like science fiction, it’s not. Researchers have already tested it on Pixel and Samsung devices with unsettling results. [Read more…]

Filed Under: Blog, Cybersecurity Tagged With: 2fa, 2FA code theft, alan linghao wang, Android, android security, CVE-2025-48561, cybersecurity, cybersecurity research, galaxy s25, google authenticator, google security patch, gpu.zip, malware, mobile hacking, pixel 6, pixel 7, pixel 8, pixel 9, Pixel devices, pixnapping, ricardo paccagnella, smartphone vulnerabilities, timing attack

Windows 10 Is Dead. Long Live Windows 10!

October 14, 2025 by Edward Silha

A cartoon-style illustration showing an old desktop PC holding a shield labeled "Windows 10" while standing defiantly. Around it, sleek new laptops and tablets wave flags with the Windows 11 logo. The background hints at a battlefield, symbolizing the ongoing fight for relevance and support in the Windows ecosystem.After nearly a decade, Microsoft is finally closing the book on Windows 10. As of today, free support and regular security patches have officially ended. But despite the headlines, your computer is not about to implode. If you plan wisely, or even just use decent security software, you can keep running Windows 10 safely for a quite a bit longer. [Read more…]

Filed Under: Blog, Cybersecurity, Tech In General Tagged With: cybersecurity, ESU program, extended security updates, Microsoft, operating systems, PC upgrades, Windows 10, Windows 11

12 Rogue Certificates for Cloudflare’s DNS Raise Global Security Alarm

September 6, 2025 by Edward Silha

Cartoon-style illustration of a giant padlock labeled “1.1.1.1 DNS” with broken certificate chains, symbolizing compromised trustOn Wednesday, researchers uncovered three improperly issued TLS certificates for Cloudflare’s 1.1.1.1 DNS service, encrypted DNS lookup used by millions. The concern was clear: anyone with those credentials could impersonate Cloudflare’s resolver, decrypt user traffic, or redirect queries to malicious sites.

Further investigation revealed the breach was worse than initially thought. Cloudflare confirmed that Fina CA—a Microsoft‑trusted certificate authority, had in fact issued a total of twelve unauthorized certificates for 1.1.1.1 since February 2024. [Read more…]

Filed Under: Blog, Cybersecurity, Tech In General Tagged With: 1.1.1.1, CA accountability, certificate authority, certificate mis-issuance, Certificate Transparency, Cloudflare, DNS over HTTPS, DNS over TLS, DNS security, encryption, Fina CA, internet trust, Microsoft root store, Microsoft trust, PKI, TLS certificates, TLS mis-issuance, web security

  • 1
  • 2
  • 3
  • …
  • 5
  • Next Page »

Social Media

  • Facebook
  • GitHub
  • LinkedIn
  • Periscope
  • Twitter

Forward Technologies
747 N LaSalle
STE 500B
Chicago, IL 60654
(312) 715-7806

Copyright © 2026 — Forward Technologies • All rights reserved. • Privacy Policy •