Technology Tips: October 2025 Edition
Skyward IT Services Network Infrastructure and Security Specialists |
All it takes is faith, trust, and a little bit of Pixie Dust
… to crack into your network, that is.Pixie Dust vulnerabilities in Wi-Fi Protected Setup (WPS) allow bad actors to use brute-force entry against weak pin generators. Attackers then use the compromised pin to gain entry via the access point.
The Pixie Dust vulnerabilities are over a decade old but are resurfacing in “internet of things” appliances—think smart washers, coffeemakers, speakers like Alexa, thermostats, even toothbrushes. These internet-connected devices may be vulnerable to this type of brute force entry. Once bad actors have cracked into this Wi-Fi enabled device, the entire WPS network is fair game. Unfortunately, it’s difficult to tell whether the device is susceptible to this type of attack. Even devices with the same model number could have different hardware working inside.
Reopen closed tabs in a flash
It’s happened to all of us. Right as you click the X on a tab, you realize, “wait, I still need that!” Sure, you can go to your browser history and reopen the link, but did you know there’s a faster way? On a PC, press Ctrl + Shift + T. On a Mac, it’s as easy as Cmd + Shift + T. And voila, your tab is back!
Watch out for holiday scams
The holiday season is just around the corner. For most of us, it’ll be a busy time—greeting cards to send, gifts to order, and events to attend. But we’re not the only ones hard at work—scammers are too. And the holiday season is ripe with opportunity.Keep an eye out for fake shipping texts and emails with links to supposed tracking or messages from USPS, UPS, and FedEx. Often, these messages create a false sense of urgency. (“Your package is being held! Contact us within 24 hours to have it released.)
Along similar lines, watch your inbox for unexpected holiday messages with links or attachments, or emails asking you to enter your login credentials or bank information. When it doubt, go straight to the source: type in the URL instead of using email shortcuts that may lead to a phishing scheme.
Malware of the month
Microsoft Teams recently removed over 200 certificates created by a threat actor to deliver malware, ransomware, and data extortion engines. The delivery mechanism? Fake .exe files downloaded from the internet that looked like the real thing.Using legit tactics like SEO and advertising, attackers were able to scam unsuspecting users into downloading the Microsoft-lookalike. The group, Vanilla Tempest, has targeted schools in the past.
Thinking about edtech for your district? We'd love to help. Visit skyward.com/get-started to learn more.
Skyward IT Services Network Infrastructure and Security Specialists |