Chicago IT Support & Cyber Security | Forward Technologies

Chicago-based Forward Technologies delivers IT support and cyber security to businesses in the Chicago area and nationwide.

  • Home
  • Services
    • Outsourced IT Support
    • DMARC Email Security
    • Development
      • Web Development & Facelifts
      • CustomView: Plugin for WordPress
    • Data Recovery Service
    • PPC Marketing Services
    • SEO Services
  • Email Security
    • SPF Basics
    • DKIM Basics
    • DMARC Basics
    • Email Security Consulting
  • Data Recovery Service
  • Blog
  • Contact Us

Hackers Hide Malware in DNS Records to Evade Detection

July 16, 2025 by Edward Silha

An endpoint computer receiving a DNS response, which reassembles into a malicious script, shown as puzzle pieces forming a bug icon at the user’s terminal.A new cybersecurity threat is emerging as attackers use DNS records—the very system that directs internet traffic—to hide malware. Instead of relying on email attachments or suspicious downloads, bad actors are embedding malicious payloads into DNS TXT records. This method sneaks malicious code past traditional defenses because security tools often ignore DNS traffic.

DNS, or Domain Name System, acts like the internet’s phonebook, translating domain names into IP addresses. It is so fundamental and routine that most security systems allow it without scrutiny. That makes it a perfect hiding place. According to researchers at Infoblox, attackers are disguising shellcode—malicious binary instructions—inside base64-encoded TXT records. These look like harmless text but are reassembled and executed by compromised devices once fetched.  [Read more…]

Filed Under: Blog, Cybersecurity Tagged With: Cobalt Strike, cybersecurity, cybersecurity threats, data exfiltration, DNS blind spot, DNS malware, DNS security, DNS tunneling, DNS TXT records, DNS-based attacks, DomainTools, Infoblox, TXT records, zero trust

Google says its Gemini AI will soon be able to access your messages and utilities on your phone. I fail to see that as a good thing.

July 8, 2025 by Edward Silha

Cartoon-style Android phone surrounded by apps like Messages, WhatsApp, and Phone, while a robot labeled “Gemini” peeks out from inside the screen holding binoculars.If you use an Android phone, there’s a good chance Google’s Gemini AI is now interacting with your apps, even if you thought you had disabled it. The company recently rolled out changes that grant Gemini new levels of access to messages, phone calls, and third-party apps like WhatsApp, regardless of whether users had previously opted out. If that sounds invasive, it’s because it is.

In emails sent to Android users ahead of the rollout, Google framed the change as a convenience upgrade. Gemini, they said, can now help users perform everyday tasks more easily, such as initiating calls, sending messages, and launching utilities. These functions, Google explained, would be available “whether your Gemini Apps Activity is on or off.” The update began rolling out automatically on July 7. [Read more…]

Filed Under: AI, Blog, Tech In General Tagged With: AI integration, Android privacy, Android surveillance, Gemini AI, Google Assistant, Google Gemini, tech transparency

Homoglyph Phishing: When One Letter Steals Everything

July 7, 2025 by Edward Silha

A user clicking an email link, leading to two identical websites—one real, one fake—split like a mirror.You click a link. It takes you to a site that looks exactly right. The logo matches, the name checks out, and everything feels familiar. But something’s off. And before you realize what it is, you’ve handed over your login, your credit card, or worse, your network credentials. The trick wasn’t in the layout or the content. It was in the letters.

Cybercriminals are using homoglyphs—lookalike characters from other alphabets—to build fake domains that mimic real ones down to the pixel. A Cyrillic “а” is nearly identical to the Latin “a” your eyes expect to see. To a browser, they’re completely different. To a person, they’re the same. That’s the whole con. [Read more…]

Filed Under: Blog, Cybersecurity, Tech In General Tagged With: brand impersonation, browser security, credential theft, cybersecurity threats, Cyrillic characters, DNS manipulation, domain impersonation, domain spoofing, homoglyph attacks, homoglyph phishing, PayPal phishing, phishing, phishing scams, spoofed domains, Unicode attacks, unicode security

Stalkerware App Meant for “Parental Control” Leaks Passwords and User Data

July 5, 2025 by Edward Silha

A cartoon-style smartphone with glowing eyes hidden under a trench coat, sneaking data into a dark web dashboard while a folder labeled “Passwords” leaks out onto the ground.A surveillance app marketed as a stealthy tool for parents has exposed sensitive data from over 62,000 users, raising fresh concerns about the real audience for apps like it.

The app, called Catwatchful, claims to offer invisible monitoring for Android phones. According to its creators, it’s intended to help parents keep tabs on their children’s digital activity. But the app’s heavy emphasis on secrecy and undetectability tells a different story. On its website, Catwatchful boasts that it “cannot be detected,” “cannot be uninstalled,” and “only you can access the information it collects.” [Read more…]

Filed Under: Blog, Cybersecurity Tagged With: Android spyware, Catwatchful, cybersecurity, data breach, parental control apps, Play Protect, stalkerware

Microsoft Retires the Blue Screen of Death, Because Apparently Black Is More Soothing

June 27, 2025 by Edward Silha

Cartoon-style desktop computer surrounded by blue error screens in the trash, with a sleek black screen displaying a simplified crash message on the monitor.After 40 years of glaring blue error messages and frowny faces, Microsoft is giving the infamous Blue Screen of Death a final sendoff. Starting later this summer, Windows 11 devices will crash in a new color. Say hello to the Black Screen of Death.

The change isn’t just about ditching the old aesthetic. Microsoft says the new screen will simplify crash messages and speed up recovery. Gone is the sad face emoticon. In its place is a stripped-down message with technical details like the stop code and system driver that triggered the failure. The goal is to help users recover faster and give IT teams what they need without dragging them into a full-blown forensic session. [Read more…]

Filed Under: Blog, Tech In General Tagged With: black screen of death, blue screen of death, bsod, crash recovery, crowdstrike outage, it support, Microsoft, quick machine recovery, system crash, tech culture, Windows 11, windows 24h2, windows resiliency initiative, windows update

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 8
  • Next Page »

Social Media

  • Facebook
  • GitHub
  • LinkedIn
  • Periscope
  • Twitter

Forward Technologies
747 N LaSalle
STE 500B
Chicago, IL 60654
(312) 715-7806

Copyright © 2025 — Forward Technologies • All rights reserved. • Privacy Policy •