Here’s a scary warning for anyone who puts their photos in the cloud? Emergency!!

Flickr’s Big Change Proves You Can’t Trust Online Services. The once popular photo-sharing destination announced this month that it’s limiting free membership accounts to just 1,000 images. If you want unlimited storage, you’ll have to pay $50 a year. Don’t pay up? The service will delete old photographs until you’re at the 1,000-image limit. …

But as more of our digital memories move online, we’ve put our histories in the hands of companies that act capriciously or lose control of their own narrative.

Medium.com  click the link to read the rest of the story.

Are you depending on a free online service?Join the conversation on our Facebook Page!

 

500K Android users hit with malware, and what to do now

More than half a million Android users installed malware disguised as smartphone games—right from the Google Play store. Mainly posing as a driving game, the malware was found in as many as 13 apps, according to tweets from ESET security researcher Lukas Stefanko.

This is not the first time…

TechRepublic.com  click the link to read the rest of the story.

Did you find an infected app on your phone?Join the conversation on our Facebook Page!

This is how online tracking works

Buzzwords like privacy, cookies, tracking, etc. are appearing on every news outlet that cares about the web. But they usually just scratch the surface, leaving a lot of the underlying machinery in the dark and still hidden away. … I’ll attempt to describe the different pieces that comprise online tracking, in a way that goes beyond the cookies and scripts.

unformated.space  click the link to read the rest of the story.

Was this helpful?Join the conversation on our Facebook Page!

The Best Private Search Engines — Alternatives to Google

There are now many smaller players in the search game that are growing rapidly. Google’s market share has declined from 78.7 percent in February 2017 to slightly below 70 percent in February 2018.

A few of these search engines, including DuckDuckGo and StartPage began as normal search engines with no privacy enhancements. However, after they realized the massive risk associated with storing so much data, they decided to take a different approach.

HackerMoon.com  click the link to read the rest of the story.

Have you tried one of these search engines?Join the conversation on our Facebook Page!

Terrifying new email scam & what to do

People are being victimized by a terrifying new email scam where attackers claim they stole your password and hacked your webcam while you were watching porn — here’s how to protect yourself. The attacker probably took your password from a publicly available database of old leaked passwords and email addresses.

BusinessInsider.com  click the link to read the rest of the story.

I have seen this, have you?Join the conversation on our Facebook Page!

Get ready for Dell’s – 2018 Black Friday Deals

$120 Inspiron laptop, $500 gaming desktop, and more.  The PC manufacturer offers its usual range of deals on laptops and desktops, though many are of the limited-time “doorbuster” variety.  The biggest doorbuster will no doubt be the Inspiron 11 3000 laptop, which will sell for just $119.99.

zdnet.com  click the link to read the rest of the story.

Will you be purchasing a new computer soon?
Join the conversation on our Facebook Page!

Researchers discover seven new Meltdown and Spectre attacks

A team of nine academics has revealed today seven new CPU attacks. The seven impact AMD, ARM, and Intel CPUs to various degrees.

Two of the seven new attacks are variations of the Meltdown attack, while the other five are variations on the original Spectre attack — two well-known attacks that have been revealed at the start of the year and found to impact CPUs models going back to 1995.

zdnet.com  click the link to read the rest of the story.

How are you protecting your business from this?Join the conversation on our Facebook Page!

The New Cryptojacking: Victims’ Computers Mine Cryptocurrency

Computers infected with cryptojacking malware run much slower, and often victims are not even aware that their computers are being attacked, as “coin mining” malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation.

Forbes.com  click the link to read the rest of the story.

Want to have your computers checked?Join the conversation on our Facebook Page!

Why WannaCry ransomware is still a threat to your PC

WannaCry tops the list of the most widespread cryptor families, with attempted attacks against 74,621 of the security firm’s users across the globe between July and September.  WannaCry ransomware attacks have risen as proportion of the total attack compared with the same period last year: in Q3 2017

zdnet.com  click the link to read the rest of the story.

Is your business protected?Join the conversation on our Facebook Page!

Mobile Privacy Now Easy – Cloudflare’s New Android and iOS apps

Cloudflare has guaranteed user privacy and improved look-up speed. … Activists and journalists have used it to bypass blocklists in oppressive countries, and regular users have also used it to improve their day-to-day Internet connections. Furthermore, funneling DNS traffic through Cloudflare’s DNS server also prevents internet service providers from watching over a user’s traffic…

zdnet.com  click the link to read the rest of the story.

Will you use a service like this?Join the conversation on our Facebook Page!

21 Video Marketing Tools Every Marketer Should Know in 2019

Studies have found that by 2019, video traffic will comprise 80% of all internet traffic with 1.9 billion viewers worldwide (excluding mobile users).

If you are looking to promote your brand through video marketing, check out these essential video marketing tools that can help you.

Medium.com  click the link to read the rest of the story.

Are you using video in your marketing?Join the conversation on our Facebook Page!

Microsoft’s activation alert is scaring Windows 10 users

Microsoft is reportedly working on a fix for a bug in its activation server that has caused Windows 10 Pro machines to report that their license has not been activated.  …

Microsoft has reportedly confirmed there is an issue affecting its activation server and is working on a fix that will happen in “one or two business days”.

That should mean affected Windows 10 Pro licenses are still valid, despite what Microsoft is reporting.

zdnet.com  click the link to read the rest of the story.

We were hit with this, were you?Join the conversation on our Facebook Page!

Why ransomware costs small businesses big money

About 22% of businesses with less than 1,000 employees that experienced a ransomware attack in the last year had to stop business operations immediately. About 15% lost revenue.

On average, small companies lost over $100,000 per ransomware incident due to downtime. For one in six organizations, these attacks caused 25 hours or more of downtime.

cnn.com  click the link to read the rest of the story.

How much would it cost your business to be down for several days?Join the conversation on our Facebook Page!

23 Social Engineering Attacks You Need To Shut Down

A social engineering attack is an orchestrated campaign against employees at either a variety of companies or one high valued business using a variety of digital, in-person or over the phone techniques to steal intellectual property, credentials or money.

Hackers prefer social engineering because it’s much easier to hack a human than a business. Social engineering attacks allow the hacker to combine multiple efforts and even cover their tracks, because they can use the human to take money or install malware under their persona.

smartfile.com  click the link to read the rest of the story.

How well trained is your team to deal with social engineering attacks?Join the conversation on our Facebook Page!

A New Threat to Your Finances: Cell-Phone Account Fraud

Consumers have a new privacy threat to worry about. It’s known as cell-phone account fraud, where crooks open up a phony cell-phone account in your name and use it to access your bank account, sign up for credit cards, or sell the phone number for other criminals to use.

While little known among consumers, cell-phone account fraud can have a devastating impact on your finances—and your reputation.

consumerreports.com  click the link to read the rest of the story.

Have you been hit with this scam?Join the conversation on our Facebook Page!

Ransomware shuts down 1 in 5 small businesses after it hits

When businesses are hit with ransomware, it’s not just the ransom amount that could financially hurt. The time spent trying to get systems back online and potential revenue lost in the meantime makes a lasting impact, too.

cnn.com  click the link to read the rest of the story.

What would it cost your business to be shut down for days?Join the conversation on our Facebook Page!

Even After Multiple Cyberattacks, Many Businesses Fail to Bolster Security. Here’s What You Need to Do

Small businesses suffered a barrage of computer invasions last year but most took no action to shore up their security afterward, according to a survey by insurer Hiscox.  It found that 47 percent of small businesses reported that they had one attack in 2017, and 44 percent said they had two to four attacks.  The invasions included ransomware, which makes a computer’s files unusable unless the device’s user or owner pays a ransom…

inc.com  click the link to read the rest of the story.

How many times have you been attacked?Join the conversation on our Facebook Page!

OK, panic—newly evolved ransomware is bad news for everyone

There’s something inherently world-changing about the latest round of crypto-ransomware that has been hitting a wide range of organizations over the past few months. While most of the reported incidents of data being held hostage have purportedly involved a careless click by an individual on an e-mail attachment, an emerging class of criminals with slightly greater skill has turned ransomware into a sure way to cash in on just about any network intrusion.
And that means that there’s now a financial incentive for going after just about anything. While the payoff of going after businesses’ networks used to depend on the long play—working deep into the network, finding and packaging data, smuggling it back out—ransomware attacks don’t require that level of sophistication today. It’s now much easier to convert hacks into cash.

arstechnica.com  click the link to read the rest of the story.

How are you protecting yourself from ransomware?Join the conversation on our Facebook Page!

The Ultimate Guide to Get Started on Your Business Idea

Business ideas are great. They make us feel like we are onto something.

Something big.

Our adrenaline spikes and we want to get started right away.

But what does “getting started” even mean? Printing your business card? Making a website? Hiring a co-founder? Incorporate the business?

Not exactly.

Here are the exact steps you should take to refine and validate your idea before you do any of these things!

entrepreneurshandbook.co  click the link to read the rest of the story.

Do you have a business idea you are sitting on?Join the conversation on our Facebook Page!

How to Do Passwords Right in 2018

Modern-day browsers can not only save your passwords for you—they can recommend new, secure passwords whenever you need to create a new one, and can even warn you when you’re using the same password across multiple accounts.

gizmodo.com  click the link to read the rest of the story. Image via bitsfrombytes.com

Do you use a password manager?Join the conversation on our Facebook Page!

How to Pitch a Product in Front of 7,000 People

Imagine the eyes of 7,000 people on you as four celebrity judges prepare their toughest questions to challenge your vision for the future of your company.

Medium.com  click the link to read the rest of the story.

Have you ever had the opportunity to speak to a crowd of 7,000?Join the conversation on our Facebook Page!

5 Unexpected Ransomware Attacks You need to know

Ransomware attacks are proliferating unimaginably. Coming year might come along with some more serious threats. We hope security researchers come up with sure solutions for these robust malware program and innocent users aren’t harmed anymore.

Above all, we highly recommend all user to take offline backup of their data. Even if they are attacked with any such attack, they won’t end up becoming a victim.

SysTweak.com  click the link to read the rest of the story.

Have you seen any of these attacks?Join the conversation on our Facebook Page!

Internet 100 times faster with ‘Twisted’ fibre optic?

A new development in fibre optics could make internet speeds up to 100 times faster – by detecting light that has been twisted into a spiral. … By twisting light into a spiral, engineers effectively create a third dimension for light to carry information: the level of orbital angular momentum, or spin. “It’s like DNA, if you look at the double helix spiral,” said Min Gu from RMIT University. “The more you can use angular momentum the more information you can carry.”

TheGuardian.com  click the link to read the rest of the story.

Are you using fiber connections in your office?Join the conversation on our Facebook Page!

10 Must-Read Books That Will Make You Ridiculously Productive

While there isn’t a perfect productivity formula for everyone, the 11 reads below will inspire you to create your very own process that works for getting more stuff done—and enjoying every day more in the process.

ProductHunt.com  click the link to read the rest of the story.

Have you read a book book on productivity, lately?Join the conversation on our Facebook Page!

How to spot a phishing email?

One of the solution I’d implement would be: when ever we hover over the link its should show you to which link it is pointing or redirecting to and this solution needs to be implemented by all email providers like Google’s Gmail, Microsoft’s Outlook etc. This will prevent the user from exposing their personal information to hackers.

Medium.com  click the link to read the rest of the story.

Have you been the victim of a phishing attack?Join the conversation on our Facebook Page!

China to Control the Internet of Things to Spy on Business?

China is aggressively seeking to dominate the Internet of Things and plans to use access to billions of networked electronic devices for intelligence-gathering, sabotage, and business purposes, according to a forthcoming congressional report.

Freebeacon.com  click the link to read the rest of the story.

Do you really think your business is safe from this?Join the conversation on our Facebook Page!

12 signs you’ve been hacked — and how to fight back

Here are 12 sure signs you’ve been hacked and what to do in the event of compromise. Note that in all cases, the number 1 recommendation is to completely restore your system to a known good state before proceeding.

csoonline.com  click the link to read the rest of the story.

Have you been hacked? What did you do?Join the conversation on our Facebook Page!

Great Companies Obsess Over Productivity, Not Efficiency

Business leaders often think of “efficiency” and “productivity” as synonyms, two sides of the same coin.

When it comes to strategy, however, efficiency and productivity are very different. At a time when so many companies are starved for growth, senior leaders must bring a productivity mindset to their business and remove organizational obstacles to workforce productivity. This view differs substantially from the relentless focus on efficiency that has characterized management thinking for most of the last three decades, but it is absolutely essential if companies are going to spur innovation and reignite profitable growth.

Harvard Business Review  click the link to read the rest of the story.

Could this help your company?Join the conversation on our Facebook Page!

Your Coffee Shop Wi-fi Can See What You Are Connecting To

We connect to public wi-fi systems and think that we are not giving away the sites we are visiting, as we are using HTTPs connections. But think again, our DNS requests reveal the sites we are connecting to. Also the start of the TLS connection actually reveals the site we are connecting to. … so Cloudflare have just announced that they have implemented ESNI (encrypted Server Name Indication (SNI) TLS extension). This aims to stop ISPs and public wi-fi providers from snooping on your Web accesses (or anyone else who listens to your network packets).

Medium.com  click the link to read the rest of the story.

Are you using Cloudflare services?Join the conversation on our Facebook Page!