/Tag:Security

Does HTTPS ensure your privacy online?

Earlier this year, Google announced that from now on, in addition to green icons in the address bar on sites with HTTPS, the Chrome browser will label sites that use regular HTTP, as non secure.  The news is not remarkable in itself, as this is not Google's first step in pushing the HTTPS standard, the [...]

By | 2018-04-27T13:13:14+00:00 April 27th, 2018|IT Security, Software News|Comments Off on Does HTTPS ensure your privacy online?

Zero day exploit compromises all versions of Internet Explorer

Some APT-group are actively exploiting a new zero-day vulnerability in the code of the core of Internet Explorer.  Attacks recorded a slew of data from the attack, as reported by the blog that initially discovered the attack.   The problem, which experts describe as a double kill attack, affects all the latest versions of Internet [...]

By | 2018-04-23T15:48:02+00:00 April 23rd, 2018|IT Security, Software News|Comments Off on Zero day exploit compromises all versions of Internet Explorer

Attacks against enterprise networks went up 40% in 2017

According to the research of a verified source, 2017 contained one of the highest increases in attacks against enterprise networks ever recorded. Over 12 months, 28% of industrial enterprises in the world were attacked in some way - in 2016 that number was only 20%.. These figures confirm the forecasts of security experts that in [...]

By | 2018-01-30T11:36:10+00:00 January 30th, 2018|IT News, IT Security|Comments Off on Attacks against enterprise networks went up 40% in 2017

A 2.4 million phone botnet that is still active today.

In the fall of 2016, a source announced the appearance of a new type of malware, Android Trojan DressCode,  a hidden malware which without the users knowledge, used the infected devices in a botnet.  The hacker who wrote it kidnapped confidential information even from secured networks by distributing it in applications for phones that anyone [...]

By | 2018-01-29T12:02:40+00:00 January 29th, 2018|IT Security, Software News|Comments Off on A 2.4 million phone botnet that is still active today.

A new extension to hide your digital fingerprint

In an age where it seems like every company is looking to extract and sell every drop of data it can squeeze out of users its a breath of fresh air to hear about a company that not only doesn't collect and sell your data, but actively alerts you to who your favorite websites are [...]

By | 2018-01-25T16:16:37+00:00 January 25th, 2018|IT Security, Software News|Comments Off on A new extension to hide your digital fingerprint

How to tell if you’re being spied on by a drone

Israeli experts from Ben-Gurion University and Weizmann Research Institute have developed a technique to determine when a drone is following an object. They  experimented using a varity of drones and flash, or a light that can rapidly light up then darken an area.  According to them, if the UAV (unmanned aerial vehicle) is actually observing [...]

By | 2018-01-15T15:07:24+00:00 January 15th, 2018|Hardware News|Comments Off on How to tell if you’re being spied on by a drone

WPA-3, a more secure, versatile WiFi

The standards for WPA3, the latest in WiFi encryption has been announced and includes a slew of new security features.  The combination of the largest manufacturers of computer equipment and Wi-Fi devices, Wi-Fi Alliance, published the first details about the data protection protocol WPA3, which will replace WPA2 in the near future   The first [...]

By | 2018-01-10T14:54:01+00:00 January 10th, 2018|Hardware News, IT Security|Comments Off on WPA-3, a more secure, versatile WiFi

The biggest computer bug…ever?

Well this should be one to go down for the ages.  Usually, if a problem arises if it only affects a small percentage of users and can quickly be fixed with a small patch.  But, if I were to say, for example, that all Dell computers were suddenly hit with a bug that left kernel [...]

By | 2018-01-04T14:34:41+00:00 January 4th, 2018|IT news and stories|Comments Off on The biggest computer bug…ever?

The many types of cyber criminals, part 2

Espionage     The purpose of espionage, can range from hacking individual computers or devices and ending with illegal mass surveillance, of governments or even entire populations.  It boils down to secret tracking of our personal lives.  Another for of cybercrime that can be engaged as  physical espionage (for example, using web or CCTV cameras [...]

By | 2017-12-13T16:06:16+00:00 December 13th, 2017|IT Security|Comments Off on The many types of cyber criminals, part 2

The many types of Cybercriminals, part 1

Cybercrime is any criminal activity where the object as a target and / or tool is a computer or network device.  In some cybercrimes, direct attacks are carried out on computers or other devices for the purpose of disabling a target.  In others, computers are used to distribute malware, illegal information, images and other materials [...]

By | 2017-12-12T14:06:56+00:00 December 8th, 2017|IT News, IT Security|Comments Off on The many types of Cybercriminals, part 1