/Tag:Security

Attacks against enterprise networks went up 40% in 2017

According to the research of a verified source, 2017 contained one of the highest increases in attacks against enterprise networks ever recorded. Over 12 months, 28% of industrial enterprises in the world were attacked in some way - in 2016 that number was only 20%.. These figures confirm the forecasts of security experts that in [...]

By | 2018-01-30T11:36:10+00:00 January 30th, 2018|IT News, IT Security|Comments Off on Attacks against enterprise networks went up 40% in 2017

A 2.4 million phone botnet that is still active today.

In the fall of 2016, a source announced the appearance of a new type of malware, Android Trojan DressCode,  a hidden malware which without the users knowledge, used the infected devices in a botnet.  The hacker who wrote it kidnapped confidential information even from secured networks by distributing it in applications for phones that anyone [...]

By | 2018-01-29T12:02:40+00:00 January 29th, 2018|IT Security, Software News|Comments Off on A 2.4 million phone botnet that is still active today.

A new extension to hide your digital fingerprint

In an age where it seems like every company is looking to extract and sell every drop of data it can squeeze out of users its a breath of fresh air to hear about a company that not only doesn't collect and sell your data, but actively alerts you to who your favorite websites are [...]

By | 2018-01-25T16:16:37+00:00 January 25th, 2018|IT Security, Software News|Comments Off on A new extension to hide your digital fingerprint

How to tell if you’re being spied on by a drone

Israeli experts from Ben-Gurion University and Weizmann Research Institute have developed a technique to determine when a drone is following an object. They  experimented using a varity of drones and flash, or a light that can rapidly light up then darken an area.  According to them, if the UAV (unmanned aerial vehicle) is actually observing [...]

By | 2018-01-15T15:07:24+00:00 January 15th, 2018|Hardware News|Comments Off on How to tell if you’re being spied on by a drone

WPA-3, a more secure, versatile WiFi

The standards for WPA3, the latest in WiFi encryption has been announced and includes a slew of new security features.  The combination of the largest manufacturers of computer equipment and Wi-Fi devices, Wi-Fi Alliance, published the first details about the data protection protocol WPA3, which will replace WPA2 in the near future   The first [...]

By | 2018-01-10T14:54:01+00:00 January 10th, 2018|Hardware News, IT Security|Comments Off on WPA-3, a more secure, versatile WiFi

The biggest computer bug…ever?

Well this should be one to go down for the ages.  Usually, if a problem arises if it only affects a small percentage of users and can quickly be fixed with a small patch.  But, if I were to say, for example, that all Dell computers were suddenly hit with a bug that left kernel [...]

By | 2018-01-04T14:34:41+00:00 January 4th, 2018|IT news and stories|Comments Off on The biggest computer bug…ever?

The many types of cyber criminals, part 2

Espionage     The purpose of espionage, can range from hacking individual computers or devices and ending with illegal mass surveillance, of governments or even entire populations.  It boils down to secret tracking of our personal lives.  Another for of cybercrime that can be engaged as  physical espionage (for example, using web or CCTV cameras [...]

By | 2017-12-13T16:06:16+00:00 December 13th, 2017|IT Security|Comments Off on The many types of cyber criminals, part 2

The many types of Cybercriminals, part 1

Cybercrime is any criminal activity where the object as a target and / or tool is a computer or network device.  In some cybercrimes, direct attacks are carried out on computers or other devices for the purpose of disabling a target.  In others, computers are used to distribute malware, illegal information, images and other materials [...]

By | 2017-12-12T14:06:56+00:00 December 8th, 2017|IT News, IT Security|Comments Off on The many types of Cybercriminals, part 1

Can hackers talk to your kids?

Researchers from the British consumer protection organization  found vulnerabilities in smart toys with Bluetooth or Wi-Fi connection support, allowing attackers to talk to children. As the study showed, four of the seven toys tested can be used to communicate with children playing with them. Vulnerabilities were found in toys such as the Furby Connect, i-Que [...]

By | 2017-11-17T09:27:14+00:00 November 16th, 2017|IT Security|Comments Off on Can hackers talk to your kids?

Microsoft Office 2007: Still used by many.

Whether it is Word, Excel or Powerpoint Microsoft's Office suite is used by the majority of students, consumers and businesses for everyday work. However, not everyone uses the latest version of Microsoft Office. In fact, a study by the IT company Spiceworks showed that out of 1,138 major US and Canadian companies  about 68% still use Microsoft Office 2007. [...]

By | 2017-11-14T11:26:00+00:00 November 8th, 2017|Software News|Comments Off on Microsoft Office 2007: Still used by many.