email
Get the newsletter
Newsletter
search
Search blog
October 21, 2025 • read

Technology Tips: October 2025 Edition

LinkedIn Card
Skyward IT Services
Network Infrastructure and Security Specialists

In this article
Share this story

All it takes is faith, trust, and a little bit of Pixie Dust 

… to crack into your network, that is.

Pixie Dust vulnerabilities in Wi-Fi Protected Setup (WPS) allow bad actors to use brute-force entry against weak pin generators. Attackers then use the compromised pin to gain entry via the access point.

The Pixie Dust vulnerabilities are over a decade old but are resurfacing in “internet of things” appliances—think smart washers, coffeemakers, speakers like Alexa, thermostats, even toothbrushes. These internet-connected devices may be vulnerable to this type of brute force entry. Once bad actors have cracked into this Wi-Fi enabled device, the entire WPS network is fair game. Unfortunately, it’s difficult to tell whether the device is susceptible to this type of attack. Even devices with the same model number could have different hardware working inside.


Reopen closed tabs in a flash

It’s happened to all of us. Right as you click the X on a tab, you realize, “wait, I still need that!” Sure, you can go to your browser history and reopen the link, but did you know there’s a faster way? On a PC, press Ctrl + Shift + T. On a Mac, it’s as easy as Cmd + Shift + T. And voila, your tab is back!


Watch out for holiday scams 

The holiday season is just around the corner. For most of us, it’ll be a busy time—greeting cards to send, gifts to order, and events to attend. But we’re not the only ones hard at work—scammers are too. And the holiday season is ripe with opportunity.

Keep an eye out for fake shipping texts and emails with links to supposed tracking or messages from USPS, UPS, and FedEx. Often, these messages create a false sense of urgency. (“Your package is being held! Contact us within 24 hours to have it released.)

Along similar lines, watch your inbox for unexpected holiday messages with links or attachments, or emails asking you to enter your login credentials or bank information. When it doubt, go straight to the source: type in the URL instead of using email shortcuts that may lead to a phishing scheme.  
 

Malware of the month 

Microsoft Teams recently removed over 200 certificates created by a threat actor to deliver malware, ransomware, and data extortion engines. The delivery mechanism? Fake .exe files downloaded from the internet that looked like the real thing.

Using legit tactics like SEO and advertising, attackers were able to scam unsuspecting users into downloading the Microsoft-lookalike. The group, Vanilla Tempest, has targeted schools in the past.


 


Thinking about edtech for your district?
We'd love to help. Visit skyward.com/get-started to learn more.

Share this story
About the author
Skyward IT Services
Network Infrastructure and Security Specialists


Read more from Skyward

Free Resource Kits Make Using Skyward Easier

Share Family Access and Employee Access Toolkits with families and staff to make their lives easier. 

November 06, 2020 • Tips
iCon 2023 Recap: The Premier PD Event for Skyward Users

Have you ever wondered what it’s like to attend iCon, Skyward’s annual international conference in Florida? This recap article has you covered!  

March 28, 2023 • Events
The IT Factor: 5 Skyward Tech Offerings for 2018

This month, we’re shining a light on 5 IT services to take some weight off your shoulders and help bring your technical operations to the next level.

January 08, 2018 • Product Updates

This site uses cookies to improve your browsing experience and to help us understand how you use our site.
To learn more about how we use this data, click here. By continuing to use this site, you are consenting to our cookie policy.