Category Archives: Article
Quantum computers will break the encryption that protects the internet
Encryption has plenty of uses. It defends state secrets, and the corporate sort. It protects financial flows and medical records. And it makes the $2trn e-commerce industry possible. Without it, credit-card details, bank transfers, emails and the like would zip around the internet unprotected, for anyone so minded to see or steal. Nobody, however, is certain that the foundation of all this is sound.
economist.com click the link to read the rest of the story.
Are you concerned about your business privacy?Join the conversation on our Facebook Page!
The new Microsoft Phone, powered by Android (No Windows required)
Recent antitrust developments make it possible, in theory at least, for Microsoft and Amazon to effectively create an alternative to the stock Android experience and dislodge Google from its hegemony over the Android platform. (Microsoft also has a robust selection of apps on iOS devices, but the locked-down nature of the platform makes this sort of takeover impossible.) But you don’t have to wait for that unicorn phone to arrive. You can create a Microsoft-centric experience on Android devices now with remarkably little work.
ZDnet.org click the link to read the rest of the story.
What would it take for you to consider a switch to a Microsoft Phone?Join the conversation on our Facebook Page!
Epson Tricked Its Customers With a Dangerous Fake Update
Back in 2016, printing giant HP sent a deceitful, malicious update to millions of OfficeJet and OfficeJet Pro printers that disguised itself as a “security update.” Users who trusted HP and applied the update discovered to their chagrin that the update didn’t improve their printers’ security: rather, the updated printers had acquired the ability to reject cheaper ink, forcing the printer owners to throw away their third-party and refilled ink cartridges and buy new ones. Now, Epson has followed suit: in late 2016 or early 2017, Epson started sending deceptive updates to many of its printers. Just like HP, Epson disguised these updates as routine software improvements, when really they were poison pills, designed to downgrade printers so they could only work with Epson’s expensive ink systems.
eff.org click the link to read the rest of the story.
Does this bother you?Join the conversation on our Facebook Page!
Huawei accused of scheme to steal semiconductor technology from US start-up
A former Huawei employee has accused the company of trying to steal intellectual property in order to help China achieve technological dominance over the US by using a lawsuit against his Silicon Valley start-up.
scmp.com click the link to read the rest of the story.
Are you concerned about ip theft?Join the conversation on our Facebook Page!
Your computer could be quietly mining bitcoin — for someone else
Hackers are quietly hijacking personal computers, company servers, cable routers, mobile devices and other forms of computing power to stealthily mine cryptocurrencies — a problem that cybersecurity experts warn is growing rapidly. The act, known as cryptojacking…
NBCnews.com click the link to read the rest of the story.
Has your computer started to act strangely slow?Join the conversation on our Facebook Page!
How Amazon and Microsoft will battle Google over Android
Amazon and Microsoft are the two companies best suited to go face to face with Google in terms of app ecosystem and native application offerings for Android. Four or five years ago, this would have been inconceivable. Neither company was in a position to provide compelling applications or store experiences that rivaled what Google had. But that has changed.
ZDnet.com click the link to read the rest of the story.
Do you use Android??Join the conversation on our Facebook Page!
How to stop wasting your life watching TV and do something worthwhile with your downtime
So how do you shake up this routine and begin to invest your time in activities that truly satisfy and refresh you? As a time management coach, I’ve seen that these five strategies can help you feel like you have more free time and feel happier with how you invest it.
fastcompany.com click the link to read the rest of the story.
Have you recovered time for what matters most for you?Join the conversation on our Facebook Page!
Open Source Intelligence Gathering: The Techniques
One constant throughout my career has been my fascination with what can be learned about an organization from basic public records. The aggregation of a multitude of small pieces of information can paint a picture that is sometimes startling in its completeness. Then some holes can be filled-in with small logical leaps and inferences.
specterops.io click the link to read the rest of the story.
Are you gathering intel?Join the conversation on our Facebook Page!
Cognitive Bias: How Your Mind Plays Tricks on You and How to Overcome That at Work
Cognitive biases are common thinking errors that hinder our rational decision-making. We don’t always see things as they are. We don’t simply glean information through the senses and act on it; instead, our minds give that info their own spin, which can sometimes be deceptive. The inner experience is not always in perfect sync with what’s going on in the outer world.
zapier.com click the link to read the rest of the story.
How do you overcome confirmation bias?Join the conversation on our Facebook Page!
Google 2.0: MIT scientists are building a new search engine
The truth is a messy business, but an information revolution is coming. Danny Hillis and Peter Hopkins discuss knowledge, fake news and disruption at NeueHouse in Manhattan.
bigthink.com click the link to read the rest of the story.
Would you like a better search engine?Join the conversation on our Facebook Page!
Don’t Let Big Tech Get Rich Off Your Info
More of your data is available for the taking than you might imagine. Here’s a primer on the best products for securing your digital privacy and tips for taking back control of your info.
pcmag.com click the link to read the rest of the story.
Have you tried to delete your online data?Join the conversation on our Facebook Page!
How Companies Turn Your Data Into Money
The best description of the data economy comes from AOL, of all places. The once-mighty internet service provider now runs a tidy business in the ad-exchange space. The site promoting the service is hip and tasteful, showing happy, partying people and white text that spells out things like “Monetize your most valuable asset” in all caps. “A publisher’s audience is their currency,” the site says. “No matter how they make money from content—be it through advertising, paid subscription or syndication, a publisher’s core asset is audience and audience data.” This is weapons-grade marketing speak, but it’s also a surprisingly honest assessment of digital media’s beating heart—one that pumps out content and takes in reams of data from the people who consume that content. And somewhere, unseen, money is being made from what we see and do online.
pcmag.com click the link to read the rest of the story.
Do you use data targeting in your business?Join the conversation on our Facebook Page!
What computer networks are and how to actually understand them
Whether you are new to the world of development, or have been building things for a long time — or even if you’re a person who just likes computers and uses the internet daily — you’ve got to know the basics of networking and specifically Computer Networks. If you like digging more into servers, their security, and how you connect to your servers from a remote client, all of this requires some knowledge of computer networks and their components. I have tried to cover most of the topics concerning computer networks in this article.
freecodecamp.org click the link to read the rest of the story.
Do you know the basics of what your computer network is?Join the conversation on our Facebook Page!
What is 2-Factor Authentication and Why Should You Care?
In the traditional flow, there is just 1 layer of security, that is your password. You enter your password and voila, you can access your account. But as stated above, this process is good but not great. 2-factor authentication (2FA) adds another security layer to the login process, reducing the chances of account hacking. In this, just knowing and entering your password is not enough. This new layer can be anything like an OTP sent to your mobile, an auto-generated code, or biometric verification on a device you own.
hackernoon.com click the link to read the rest of the story.
Do you use 2-factor authentication at work?Join the conversation on our Facebook Page!
Cybercriminals Know Most Small Businesses Lack Cybersecurity
Could your business recover from an abrupt loss of $256,000? Because that’s how much a single cybersecurity hack could cost a small business, according to a recent analysis in Tech Republic.
entrepreneur.com click the link to read the rest of the story.
Have you invested in cybersecurity for your business?Join the conversation on our Facebook Page!
The fileless attack: Hacking without installing software
Cyber criminals don’t need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system. “We see it every day,” says Steven Lentz, CSO at Samsung Research America. “Something coming through, some exploit type, unknown ransomware. We’ve stopped several things with our defenses, either network-wise or at the end point.” The attacks that Lentz is worried about are fileless attacks, also known as zero-footprint attacks, macro, or non-malware attacks. These types of attacks don’t install new software on a user’s computer, so antivirus tools are more likely to miss them.
csoonline.com click the link to read the rest of the story.
Are you certain your security software detect these?Join the conversation on our Facebook Page!
Did Windows 10 October update delete your files? This tool might recover them
The Windows 10 October 2018 version 1809 upgrade hasn’t gone well for a bunch of users who lost documents and photos after updating. …
For some unknown reason, moving up to Windows 10 version 1809 may delete all the files in user folders. The folders remain, but the files within them are gone, leaving users in potentially a worse pickle than ransomware victims experience. However, there is a chance that early Windows 10 upgraders who encountered this problem might be able to recover lost files by using the free version of Avast-owned Recuva recovery software.
ZDnet.com click the link to read the rest of the story.
Have you had a problem with the October update?Join the conversation on our Facebook Page!
This cryptojacking mining malware pretends to be a Flash update
Crooks are attempting to spread their cryptojacking malware to unsuspecting victims by disguising it as an update for Flash. This particular mining operation is thought to have been operating since August this year with a big spike in activity in September and looks to trick potential victims into downloading an XMRig cryptocurrency miner — the malicious software runs in the background and secretly uses the power of the infected PC to acquire Monero for the hackers.
ZDnet.com click the link to read the rest of the story.
Could you have this malware on your computer and not know it?Join the conversation on our Facebook Page!
The Best Event Management Software
Depending on the size of your event and your biggest pain points in planning, you’ll want to select different event management software. To help you choose, here are the 10 best event management apps.
Zapier.com click the link to read the rest of the story.
Do you use an app to manage your events?Join the conversation on our Facebook Page!
Wi-Fi 6 Is Coming: Here’s Why You Should Care
The improvements with this latest generation of wifi are in two key areas: Raw speed and throughput (if wifi was a highway, we’d be talking about a higher maximum speed limit for vehicles, as well as more lanes to handle more vehicles at once). Wi-Fi 6 will support 8K video streaming…
gizmodo.com click the link to read the rest of the story.
Are you ready for wifi 6?Join the conversation on our Facebook Page!
Cult of Mac’s 50 Essential iOS Apps
If you are looking for the perfect app to boost productivity, make life more convenient or just give you a jolt of fun, you’re sure to find something that fills the bill on our list of 50 Essential iOS Apps.
Thecultofmac.com click the link to read the rest of the story.
What is you most essential app?Join the conversation on our Facebook Page!
The top 10 cyberthreats IT security teams are facing right now
IT and security professionals surveyed said they were either highly concerned or extremely concerned about the following cyberthreats, the report found:
TechRepublic.com click the link to read the rest of the story.
What has been the greatest threat to your business?Join the conversation on our Facebook Page!
A big tech company is working to free the internet from big tech companies
Components of the decentralized web may already be emerging, but they are not ready for prime time. Cloudflare, a company that makes its money by hosting the internet’s contents on far-flung servers and uses algorithms to deliver them to users as fast as possible, wants to help change that. The first step is what the company calls a “gateway,” to which anyone can connect a website and begin serving data stored in a peer-to-peer file-sharing network called the Interplanetary File System(IPFS).
technologyreview.com click the link to read the rest of the story.
Are you looking for ways to succeed outside of the mega-platforms?Join the conversation on our Facebook Page!
U.S. warns of new hacking spree from group linked to China
The U.S. government on Wednesday warned that a hacking group widely known as cloudhopper, which Western cybersecurity firms have linked to the Chinese government, has launched attacks on technology service providers in a campaign to steal data from their clients.
yahoo.com click the link to read the rest of the story.
Are you concerned about foreign hackers?Join the conversation on our Facebook Page!
The one serious MacBook Pro security flaw that nobody is talking about
Every MacBook since 2015 and every MacBook Pro since 2016 is at risk. Here’s how you can keep your machines safe.
zdnet.com click the link to read the rest of the story.
Are you concerned about Macbook Security?Join the conversation on our Facebook Page!
Thousands of WordPress sites backdoored with malicious code
Researchers believe intruders are gaining access to these sites not by exploiting flaws in the WordPress CMS itself, but vulnerabilities in outdated themes and plugins.
zdnet.com click the link to read the rest of the story.
Are your plugins updated regularly?Join the conversation on our Facebook Page!
Forget the new iPhones: Apple’s best product is now privacy
Apple makes its hundreds of billions every year by selling physical products that have a high markup. Facebook and Google, on the other hand, have a business model built around advertisers who want as much data about users as possible so they can better target them. This is why, for example, Google would never build the types of anti-tracking and privacy protections into the Android OS that Apple has done with MacOS and iOS. Google–and Facebook–aren’t going to cut off their access to all that black gold.
Fastcompany.com click the link to read the rest of the story.
Are you willing to pay for more privacy?Join the conversation on our Facebook Page!
Radical new plan to upend the World Wide Web by its inventor
Tim Berners-Lee, inventor of the World Wide Web … is working on a plan to radically alter how all of us live and work on the web. “The intent is world domination” … “It’s a historical moment.” Ever since revelations emerged that Facebook had allowed people’s data to be misused by political operatives, Berners-Lee has felt an imperative to get this digital idyll into the real world. …
The difference here is that, on Solid, all the information is under his control. Every bit of data he creates or adds on Solid exists within a Solid pod–which is an acronym for personal online data store.
Fastcompany.com click the link to read the rest of the story.
Would you like a decentralized internet, where you control your own data?Join the conversation on our Facebook Page!
If you’ve been hacked, don’t count on the police for help
Even the FBI and your local police can’t agree on who you should contact first. The FBI and your local police both suggest that you should call them. But experts warn that in many cases, neither agency will be able to help, especially if the criminal is asking for so little money. This dynamic underscores why these kinds of hacks — and yes, the porn scam really happened — are starting to proliferate.
cnet.com click the link to read the rest of the story.
Have you called the police after a hack?Join the conversation on our Facebook Page!