#tech-support

[ follow ]
#troubleshooting
Digital life
fromTheregister
1 month ago

Sysadmin fixed blustering Blackbeard's PC in seconds

A sysadmin resolved an angry manager's Wi-Fi connectivity issue in seconds by toggling the laptop's wireless switch, demonstrating that technical problems often have simple solutions.
Digital life
fromTheregister
1 month ago

Sysadmin fixed blustering Blackbeard's PC in seconds

A sysadmin resolved an angry manager's Wi-Fi connectivity issue in seconds by toggling the laptop's wireless switch, demonstrating that technical problems often have simple solutions.
fromArs Technica
3 days ago

Your tech support company runs scams. Stop-or disguise with more fraud?

Tech Live Connect processed fraudulent charges using real customer data, including names and addresses, to make the charges appear legitimate and maintain a low chargeback ratio.
Privacy professionals
fromZDNET
1 day ago

I found a way to roll back buggy Google Services updates on Android - in just a few clicks

Over the past decade, there have been a handful of occasions when an Android update wreaked havoc on my phone. Once, it was so bad that I had to do a factory reset and start over.
Digital life
DevOps
fromMedium
4 days ago

Set it up once, test it properly, and let the system handle the rest.

Automating SSL certificate renewal prevents production outages and reduces stress during incidents.
#cybersecurity
Privacy technologies
fromYahoo Tech
6 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromThe Hacker News
3 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromSecuritymagazine
3 weeks ago

How to Grow Your Cybersecurity Skills, According to Experts

Cybersecurity leaders are innovating and evolving their careers through education, soft skills, networking, and unique paths for professional growth.
Information security
fromTechCrunch
4 weeks ago

CISA urges companies to secure Microsoft Intune systems after hackers mass-wipe Stryker devices | TechCrunch

Pro-Iran hackers breached Stryker's device management systems and mass-wiped thousands of employee devices, prompting CISA to urge companies to implement multi-administrator approval for sensitive endpoint changes.
Privacy technologies
fromYahoo Tech
6 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromThe Hacker News
3 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromSecuritymagazine
3 weeks ago

How to Grow Your Cybersecurity Skills, According to Experts

Cybersecurity leaders are innovating and evolving their careers through education, soft skills, networking, and unique paths for professional growth.
Information security
fromTechCrunch
4 weeks ago

CISA urges companies to secure Microsoft Intune systems after hackers mass-wipe Stryker devices | TechCrunch

Pro-Iran hackers breached Stryker's device management systems and mass-wiped thousands of employee devices, prompting CISA to urge companies to implement multi-administrator approval for sensitive endpoint changes.
Remote teams
fromCNET
6 days ago

I Used AI to Optimize My Work-From-Home Setup. It Had Some Interesting Ideas

Working from home allows for flexible workspace choices, enhancing productivity and comfort in various settings.
Apple
fromTechCrunch
1 week ago

Astropad's Workbench reimagines remote desktop for AI agents, not IT support | TechCrunch

Demand for Apple's Mac Mini has surged, leading to the development of Astropad Workbench, a remote desktop solution tailored for AI experimentation.
Toronto startup
fromTheregister
1 week ago

Tech support chap's boss got him out of jail to finish a job

A tech support employee was detained in Mexico due to visa issues, highlighting the importance of understanding travel regulations for international assignments.
Digital life
fromwww.businessinsider.com
1 week ago

I quit my software engineering job to help seniors with tech. I assist them with things like recovering photos and bank accounts.

Adrian Amora transitioned from software engineering to a tech concierge role to enhance job satisfaction and help older adults with technology.
Privacy professionals
fromWIRED
1 week ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
DevOps
fromNew Relic
1 week ago

How to Choose Network Monitoring Tools You Can Act On

Network monitoring requires context to effectively connect network behavior to applications and services for timely decision-making during incidents.
Productivity
fromComputerworld
2 weeks ago

One-third of help-desk tickets stop work, says study

Nearly one-third of help-desk tickets in large organizations are work-stoppers, with Tuesday being the busiest day for help desks.
#microsoft
fromMakeUseOf
2 weeks ago

The hardware upgrade that changed my workflow wasn't a PC part

Finding the right desk and office chair combo can have lasting effects on the quality of your spinal health, and in my case, landing on just the right pairing has boosted my productivity big time.
Gadgets
Business intelligence
fromAbove the Law
2 weeks ago

Integrating Technology With Customer Service: Preserving The Human Element - Above the Law

Balancing automation with human connection is essential for exceptional client experiences in legal help desks.
DevOps
fromTNW | Offers
1 week ago

NinjaOne free trial. Test the unified IT operations platform

NinjaOne is a unified IT operations platform that consolidates multiple IT management functions into a single cloud-native console.
Online learning
fromeLearning Industry
3 weeks ago

What Your Customer Support Tickets Are Telling You About Your Training Program

Customer training should be based on actual support data rather than assumptions about what customers need to learn.
Gadgets
fromTheregister
3 weeks ago

Engineer sabotaged PC then complained when it didn't work

Ewen faced challenges with a fiber-optic device that produced faulty data, leading to a long drive to troubleshoot the issue.
fromTheregister
2 weeks ago

Microsoft pulls Windows update after installation problems

Installation on some devices failed with a 0x80073712 error, and Microsoft temporarily pulled the plug on Friday night. The problem affects Windows 11 24H2 and 25H2.
Software development
DevOps
fromMedium
1 week ago

I Asked This Linux Question in Every Interview-And Here's the Catch

Linux knowledge is crucial for DevOps roles, impacting job performance and work-life balance.
Tech industry
fromTheregister
3 weeks ago

Enterprise PCs are unreliable, unpatched, and unloved

Apple and Google devices show superior software update rates and reliability compared to Microsoft devices, according to Omnissa's findings.
Web development
fromTheregister
1 month ago

Brilliant backups landed web developer in big trouble

A website migration oversight caused a two-year disconnect where office staff viewed outdated content due to hardcoded DNS settings, while the client only discovered the issue when accessing the site from the office.
Remote teams
fromBusiness Matters
4 weeks ago

Hybrid work continues to drive demand for virtual desktop infrastructure

52% of employees with remote-capable jobs work in hybrid arrangements, prompting organizations to rethink cybersecurity strategies.
Information security
fromComputerWeekly.com
2 weeks ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
fromInfoWorld
3 weeks ago

Stop using AI to submit bug reports, says Google

The Google Open Source Software Vulnerability Reward Program team is increasingly concerned about the low quality of some AI-generated bug submissions, with many including hallucinations about how a vulnerability can be triggered or reporting bugs with little security impact.
Software development
Careers
fromTech Times
2 months ago

How to Launch a Remote IT Support Career: Skills, Certifications, and Job Strategies

Remote IT jobs provide flexible, high-demand, entry-friendly career paths combining certifications, self-directed learning, and hands-on experience for candidates transitioning from non-tech backgrounds.
Information security
fromSecurityWeek
4 weeks ago

Critical ScreenConnect Vulnerability Exposes Machine Keys

ConnectWise released a security update for ScreenConnect addressing CVE-2026-3564, a critical vulnerability allowing attackers to access cryptographic machine keys by encrypting previously exposed cryptographic material in server configuration files.
DevOps
fromCursor
1 month ago

How technical support at Cursor uses Cursor Cursor

Cursor consolidates code, logs, and team knowledge into single sessions, enabling support engineers to investigate issues 5-10x faster by eliminating context-gathering bottlenecks.
Artificial intelligence
fromTechzine Global
2 months ago

How does agentic ops transform IT troubleshooting?

AI Canvas enables autonomous, agentic operations that execute end-to-end IT workflows by unifying siloed data and supporting collaborative, multiperson problem solving.
Miscellaneous
fromLondon Business News | Londonlovesbusiness.com
2 months ago

The Soviet playbook: Have you tried turning it off and on? - London Business News | Londonlovesbusiness.com

The war is increasingly fought through perception, legitimacy, and technological adaptability, with Ukraine appearing younger, media-savvy, and future-oriented compared with ageing Russian leadership.
Information security
fromTechzine Global
1 month ago

Microsoft is blocking automatic Windows installations via WDS

Microsoft is discontinuing automatic Windows network deployments via WDS and Unattend.xml due to security vulnerability CVE-2026-0386 that allows attackers to execute unauthorized code and steal credentials.
fromSocial Media Explorer
1 month ago

Why Your Home Needs Professional Network Setup - Social Media Explorer

The leap from a "functional" network to a professional-grade infrastructure is the difference between a dirt path and a multi-lane highway. As we integrate more high-bandwidth technology-from 8K streaming to AI-driven home security-the "consumer-grade" hardware typically provided by service providers is reaching its breaking point.
Digital life
fromFast Company
2 months ago

AI didn't kill customer support. It's rebuilding it

There were specialists monitoring dashboards, tuning AI behavior, debugging API failures, and iterating on knowledge workflows. One team member who had started their career handling customer questions over chat and email (resetting passwords, explaining features, troubleshooting one-off issues, and escalating bugs) was now writing Python scripts to automate routing. Another was building quality-scoring models for the company's AI agent. This seemed markedly different from the hyperbole I'd been hearing about customer support roles going away in large part due to AI.
Artificial intelligence
Careers
fromeLearning Industry
2 months ago

Examples Of Technical Skills By Industry, Role, And Experience Level

Technical skills are measurable, job-specific abilities using tools, software, systems, or specialized knowledge that directly influence hiring, salary, and career advancement.
fromTheregister
2 months ago

Tech support chap invented fake fix, soon everyone used it

This week, meet a reader we'll Regomize as "Fred" who told us that in the 1990s he worked in tech support for a government agency. "The work was pretty routine, but being in that particular environment was never dull... at least not for me," he told The Register. To prove his point, Fred told us that one day a user he said we should refer to as "Emily" complained that her word processor had lost the ability to print on the resident HP LaserJet.
Gadgets
Tech industry
fromTheregister
2 months ago

IT team fixed faults faster than outsourcer could find them

An 8-CPU Sun server with removable CPU cards suffered frequent CPU-card failures and slow contracted support, forcing local IT to swap cards to restore service.
fromTheregister
1 month ago

Server crashes traced to one very literal knee-jerk reaction

It was the time of Novell networks, RG58 cables, and bulky tower PCs. It was also a time before the telemarketer's IT department employed specialists. Carter and his two colleagues - boss Mike and part-time student Stefan - therefore handled tasks ranging from programming to support, and everything in between.
Software development
fromTheregister
1 month ago

ServiceNow: AI bot is resolving 90% of our help desk tickets

In our own environment, over 90% of targeted Level 1 volume is handled autonomously, with resolution rates above 99% for those categories and materially faster than human-only workflows. It accomplishes this by having the Autonomous Workforce operate on top of the live configuration management database (CMDB), active workflows, policy engines, approval chains, and real transaction history - all updated in real time every time a ticket closes, a workflow executes, or a policy changes.
Artificial intelligence
Information security
fromThe Hacker News
1 month ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
Gadgets
fromTheregister
2 months ago

Help! Does anyone on the bus know Linux?

A bus-mounted digital signage system failed to boot, displaying a GRUB rescue prompt that requires Linux expertise and input access to repair.
Artificial intelligence
fromComputerworld
1 month ago

ServiceNow plans automation of L1 Service Desk roles, promises more AI 'specialists' to come

ServiceNow's Level 1 Service Desk AI specialist autonomously handles over 90% of IT support requests, operating 24/7 within defined enterprise governance and permissions while freeing humans for strategic work.
Tech industry
fromComputerworld
2 months ago

Microsoft releases second out-of-band fix for Windows in a week

January Windows updates caused Outlook and other apps to hang or mishandle files stored on cloud services, prompting Microsoft to release emergency out-of-band fixes.
Gadgets
fromSlashGear
2 months ago

5 Work From Home Gadgets That Solve Everyday Problems - SlashGear

Investing in ergonomic, purpose-built work-from-home gadgets reduces physical strain and increases productivity.
fromTheregister
2 months ago

Microsoft stays quiet while emergency Windows fixes ramp up

But are things getting worse? According to Register readers, and the company's own release health dashboard, the answer has to be yes. It isn't just you. The frequency of emergency out-of-band releases for the company's operating systems has been rapidly increasing to the point where, for every Patch Tuesday update, there'll likely be at least one out-of-band patch to fix whatever got broken.
Tech industry
Software development
fromMedium
2 months ago

A Shared Context Optimization to Eliminate 75% Service Calls

Refactoring reduced redundant HTTP calls between the Recommendation API and the Unified Customer Database, removing the chatty-services pattern and improving performance and code maintainability.
Software development
fromTechRepublic
2 months ago

Microsoft's Patch Fixes Are Breaking Windows, Forcing a Second Emergency Update

A January Microsoft update caused critical bugs, and subsequent fixes introduced new failures, forcing two emergency patches and widespread user disruption.
Information security
fromThe Hacker News
1 month ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
fromTheregister
2 months ago

Tech support detective solved crime by checking the carpark

"A floor manager responsible for production asked me to fix his PC, which was so slow he could literally make a coffee in the time between double-clicking an icon and having the program open," Parker told On Call. The manager's PC was only a year old and ran Windows XP, a combo that at the time of this tale should have made for decent performance.
Information security
Information security
fromTechzine Global
2 months ago

BeyondTrust Remote Support has a critical vulnerability

Unauthenticated remote-code-execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access enables full system compromise; affected versions require urgent patching or upgrades.
Information security
fromTheregister
2 months ago

Techie's one ring brought darkness by shorting a server

A technician wearing a wedding ring shorted a server board, causing an outage, briefly concealed the failure, and service resumed after an unexpected reboot.
#solarwinds
Information security
fromThe Hacker News
2 months ago

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

A critical untrusted-data deserialization vulnerability in SolarWinds Web Help Desk (CVE-2025-40551) enables unauthenticated remote code execution and is actively exploited.
Information security
fromThe Hacker News
2 months ago

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

A critical untrusted-data deserialization vulnerability in SolarWinds Web Help Desk (CVE-2025-40551) enables unauthenticated remote code execution and is actively exploited.
Information security
fromTechzine Global
2 months ago

Security vulnerability in TeamViewer bypassed permission checks

TeamViewer patched a high-risk access-control bypass (CVE-2026-23572) that allowed authenticated users to gain system access without local approval; update to 15.74.5+ immediately.
fromTheregister
1 month ago

Work experience kids sent manager to Ctrl-Alt-Del hell

This week, meet a reader we'll Regomize as "Curt" who once worked as IT security manager at a company where the helpdesk manager routinely ignored company policy by not logging out of his PC. The machine sat there ready for use, instead of reverting to a password-protected screensaver that could only be dispelled by pressing Ctrl-Alt-Del to spawn a login dialog.
Information security
fromTheregister
2 months ago

Sudo's maintainer needs resources to keep utility updated

Sudo, for those not familiar with Unix systems, is a command-line utility that allows authorized users to run specific commands as another user, typically the superuser, under tightly controlled policy rules. It is a foundational component of Unix and Linux systems: without tools like sudo, administrators would be forced to rely more heavily on direct root logins or broader privilege escalation mechanisms, increasing both operational risk and attack surface.
Information security
Information security
fromTheregister
2 months ago

Vulnerability exploits now dominate intrusions

Exploit of disclosed vulnerabilities now causes most intrusions, with attackers weaponizing new flaws within hours while many organizations patch slowly.
Information security
fromThe Hacker News
2 months ago

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

Vendors released critical security patches across Microsoft, Adobe, SAP, and Intel TDX, addressing actively exploited zero-days, code-injection, authorization flaws, and multiple other vulnerabilities.
fromThe Hacker News
2 months ago

BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

"BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability," the company said in an advisory released February 6, 2026. "By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user." The vulnerability, categorized as an operating system command injection, has been assigned the CVE identifier CVE-2026-1731.
Information security
Information security
fromZDNET
2 months ago

Microsoft said my Windows 10 PC no longer supported updates - but this software saved it

Third-party micropatch service 0patch can provide targeted security fixes to keep Windows 10 systems protected after Microsoft ends official support and ESU.
fromTheregister
2 months ago

Old Windows quirks help punch through new admin defenses

The issue focuses on how Windows handles these directories for specific user sessions. Because the kernel creates a DOS device object directory on demand, rather than at login, it cannot check whether the user is an admin during the creation process. Unlike UAC, Administrator Protection uses a hidden shadow admin account whose token handle can be returned by the system when calling the NtQueryInformationToken API function.
Information security
[ Load more ]