email
Get the newsletter
Newsletter
search
Search blog
October 21, 2025 • read

Technology Tips: October 2025 Edition

Skyward IT Services
Network Infrastructure and Security Specialists

In this article
Share this story

All it takes is faith, trust, and a little bit of Pixie Dust 

… to crack into your network, that is.

Pixie Dust vulnerabilities in Wi-Fi Protected Setup (WPS) allow bad actors to use brute-force entry against weak pin generators. Attackers then use the compromised pin to gain entry via the access point.

The Pixie Dust vulnerabilities are over a decade old but are resurfacing in “internet of things” appliances—think smart washers, coffeemakers, speakers like Alexa, thermostats, even toothbrushes. These internet-connected devices may be vulnerable to this type of brute force entry. Once bad actors have cracked into this Wi-Fi enabled device, the entire WPS network is fair game. Unfortunately, it’s difficult to tell whether the device is susceptible to this type of attack. Even devices with the same model number could have different hardware working inside.


Reopen closed tabs in a flash

It’s happened to all of us. Right as you click the X on a tab, you realize, “wait, I still need that!” Sure, you can go to your browser history and reopen the link, but did you know there’s a faster way? On a PC, press Ctrl + Shift + T. On a Mac, it’s as easy as Cmd + Shift + T. And voila, your tab is back!


Watch out for holiday scams 

The holiday season is just around the corner. For most of us, it’ll be a busy time—greeting cards to send, gifts to order, and events to attend. But we’re not the only ones hard at work—scammers are too. And the holiday season is ripe with opportunity.

Keep an eye out for fake shipping texts and emails with links to supposed tracking or messages from USPS, UPS, and FedEx. Often, these messages create a false sense of urgency. (“Your package is being held! Contact us within 24 hours to have it released.)

Along similar lines, watch your inbox for unexpected holiday messages with links or attachments, or emails asking you to enter your login credentials or bank information. When it doubt, go straight to the source: type in the URL instead of using email shortcuts that may lead to a phishing scheme.  
 

Malware of the month 

Microsoft Teams recently removed over 200 certificates created by a threat actor to deliver malware, ransomware, and data extortion engines. The delivery mechanism? Fake .exe files downloaded from the internet that looked like the real thing.

Using legit tactics like SEO and advertising, attackers were able to scam unsuspecting users into downloading the Microsoft-lookalike. The group, Vanilla Tempest, has targeted schools in the past.


 


Thinking about edtech for your district?
We'd love to help. Visit skyward.com/get-started to learn more.

Share this story
About the author
Skyward IT Services
Network Infrastructure and Security Specialists


Read more from Skyward

SMS 2.0 Spotlight: Textbook Tracking

It’s the start of the school year and there’s so much to do: textbooks to hand out, Chromebooks to distribute, Wi-Fi hot spots to give to select students. How on earth do you keep track of it all?

July 21, 2022 • Product Updates
Qmlativ Spotlight: Applicant Tracking Job Board Restructure (Desktop Version)

Get ready to experience a new level of efficiency and effectiveness in your hiring process with Skyward's updated Applicant Tracking job board.

June 05, 2024 • Product Updates
Technology Tips September 2024 Edition

What's your best technology tip? Now accepting your submissions. Plus, keeping your identity safe and a back-to-school crossword.

September 01, 2024 • Tips

This site uses cookies to improve your browsing experience and to help us understand how you use our site.
To learn more about how we use this data, click here. By continuing to use this site, you are consenting to our cookie policy.