12 Things Everyone Should Understand About Tech

Given all the time we spend with our gadgets and apps, it’s essential to understand the principles that determine how tech affects our lives.  …

What you need to know:

1. Tech is not neutral.

One of the most important things everybody should know about the apps and services they use is that the values of technology creators are deeply ingrained in every button, every link, and every glowing icon that we see. …

Medium.com click the link to read the rest of the story.

Did this article change the way you view tech?

Join the conversation on our Facebook Page!

Prepare Yourself! The Security Token Tsunami Is About To Hit

The Security Token future has come… and it’s bigger than anyone thinks. … The thing that gives me the most confidence that Security Tokens are the next big thing is the quality of people dedicating their lives to Crypto and Security Tokens... many see the Crypto Light, and know that the greatest thing about Crypto is how it’s going to make the world a better place for billions for people. This isn’t just a new financial instrument, it’s a movement, driven by a community of brilliant people, infused with a strong sense of purpose. That’s a combination poised to change the world.

Medium.com click the link to read the rest of the story.

Are you investing time and money into this, yet?Join the conversation on our Facebook Page!

Reviewing Everykey – No More Passwords No More Keys

John McAfee has a solution for those that hate passwords and know they need more secure ones.  McAfee’s solution?  It’s called Everykey and it promises to eliminate the need of passwords on your computer, websites but also your car, front-door, etc.  Everykey was launched in 2014 and it received mixed reviews at the time.  But now 5 years later they have released a new version of the firmware and Ingenious Geeks have begun to  test it here for you.  So far, it is impressive!  We have hit a few bumps in the road but it can do some amazing things.

Have you tried the updated version of the Everykey? If so, please let us know your experience.  Ours has been very positive, thus far.  Check back, we will be releasing a full review.


Everykey.com click the link to read the rest of the story.

Do you have a unique password for all of your internet accounts?

Join the conversation on our Facebook Page!

Phishing attacks: Half of organisations have fallen victim in last two years

Almost half of all organisations have fallen victim to phishing attacks in the last two years, with larger businesses the most likely to been compromised, despite also being most likely to conduct cyber security training for staff.

ZDNet.com click the link to read the rest of the story.

How are you dealing with phishing attacks in your business?

Join the conversation on our Facebook Page!

Windows 10 Intel warning: Patch 19 severe driver flaws now!

Intel is warning Windows 10 users that old graphics drivers are riddled with security flaws that need to be updated with new updates that the company has released over the past year.

Update Intel Windows graphics drivers, and stop using Intel Matrix Storage Manager and USB 3.0 Creator Utility.

ZDNet.com click the link to read the rest of the story.

Do you install quickly these patches when warnings are released?Join the conversation on our Facebook Page!

The Most Common Vulnerability Of All

It’s important to learn a bit about how malicious hackers gain access to your credentials.

Three of the most common methods include:

  • Man in the Middle (or MITM) attacks
  • Using key logger software.
  • Employing old-fashioned social engineering.

MITM attacks, as the name suggests, a third party getting between you and your desired target without your knowledge.

DatadrivenInvestor.com click the link to read the rest of the story.

How do you protect yourself from these attacks?Join the conversation on our Facebook Page!

The Best Leaders Delegate Outcomes, not activities

When you delegate the outcomes and not the activities, you help employees not just execute for the task at hand, but equip them for every future task after that. You’re giving true ownership to your team.

Signalvnoise.com click the link to read the rest of the story.

Do you delegate tasks or outcomes?Join the conversation on our Facebook Page!

Google Alert! Update Chrome Browser Immediately

Google has issued an urgent warning for Chrome users to update their browser… a security flaw is being actively exploited.

The flaw in question is referred to as a “zero-day exploit.”

Infopackets.com click the link to read the rest of the story.

Do you update your software immediately when updates are released?Join the conversation on our Facebook Page!

Why it’s so dangerous to use public Wifi

Most smartphones, laptops, and tablets automatically search and connect to WiFi networks. They usually prefer a network with a previously established connection. If you have ever logged on to the T-Mobile network on the train, for example, your device will search for a T-Mobile network in the area. … My phone automatically connects itself to one of these networks, which  [can] belong to [a hackers] device. [Hackers] can also broadcast a fictitious network name, making users believe they are actually connecting to the network of the place they’re visiting

Everything, with very few exceptions, can be cracked. The idea that public WiFi networks are not secure is not exactly news

Medium.com click the link to read the rest of the story.

Do you still use public wifi?Join the conversation on our Facebook Page!

Latest Ransomware Being Offered “as-a-service” to Wannabe Hackers

The gang behind a family of ransomware that has been active for well over a year now have tweaked their tactics in order to ensure the file-locking malware campaign is as effective as possible. GandCrab first emerged in January 2018 and has remained one of the most successful forms of ransomware ever

GandCrab operates an affiliate model, with its authors providing the ransomware “as-a-service” to wannabe hackers in exchange for a 30 to 40 percent cut of the profits.  But now researchers have observed adverts for GandCrab being posted on underground forums, specifically targeted at crooks with skills around operating remote desktop protocols, virtual network computing and experience of infiltrating corporate networks. …  There’s currently no free means of decrypting files locked with (the latest versions of ) GandCrab…

ZDNet.com click the link to read the rest of the story.

How many layers of security do you have in place to protect you?Join the conversation on our Facebook Page!

The 8 Best Email Clients for Windows in 2019

Email clients are no longer designed with just the basics we’ve come to expect, but the best now include exceptional features, things like snoozing messages, scheduling emails, and offering templates—touches that help them stand out against the growing crowd.

Zapier.com click the link to read the rest of the story.

Are any of these interesting to you?Join the conversation on our Facebook Page!

All Intel chips open to new Spoiler attack: There is no quick fix

Researchers have discovered a new flaw affecting all Intel chips due to the way they carry out speculative execution for CPU performance gains.   Like the Spectre and Meltdown attacks revealed in January 2018, Spoiler also abuses speculative execution in Intel chips to leak secrets. …Daniel (Ahmad) Moghimi, one of the paper’s authors, told The Register he doubts Intel will be able to patch the issue in the memory subsystem within the next five years.

ZDNet.com click the link to read the rest of the story.

Do you use Intel chips?Join the conversation on our Facebook Page!

Here are the data brokers quietly buying and selling your personal information

You’ve probably never heard of many of the data firms registered under a new law, but they’ve heard a lot about you. A list, and tips for opting out.

FastCompany.com click the link to read the rest of the story.

Will you use this list to opt out?Join the conversation on our Facebook Page!

Phishing alert: One in 61 emails in your inbox now contains a malicious link

The number of phishing attacks is on the rise, more than doubling in recent months, with one in 61 emails delivered to corporate inboxes found to contain a malicious URL. …

The emails are often designed to look like they come from legitimate senders – like a companyor a colleague – in order to gain the trust of the victim, before duping them into clicking the malicious link. …The purpose of the malicious URL could be to deploy malware onto the PC or it could encourage the victim to enter sensitive information into a fake version of a real service…

ZDNet.com click the link to read the rest of the story.

Have many do you think you get every day?Join the conversation on our Facebook Page!

Chinese Digital Surveillance Secrets Revealed In Database Leak

Earlier this month, security researcher Victor Gevers found and disclosed an exposed database live-tracking the locations of about 2.6 million residents of Xinjiang, China, offering a window into what a digital surveillance state looks like in the 21st century. …

EFF.org click the link to read the rest of the story.

What can we do?Join the conversation on our Facebook Page!

Hackers using stolen passwords to access TurboTax returns

Let this be a lesson: Don’t reuse your passwords.

Hackers accessed tax return information stored with TurboTax using a stolen password from a third party, an Intuit spokesman said Monday.

The attack, earlier reported in Dark Reading, didn’t breach the internal systems at Intuit, which owns TurboTax. Instead, attackers took lists of passwords stolen from other services and used them to try to log in to TurboTax accounts, the spokesman said. There, valuable personal information, such as Social Security numbers, names and addresses, is stored in tax returns.

CNet.com click the link to read the rest of the story.

Do you still use the same passwords over and over?Join the conversation on our Facebook Page!

The Surprising Power of Simply Asking Coworkers How They’re Doing

When people feel like they belong at work, they are more productive, motivated, engaged and 3.5 times more likely to contribute to their fullest potential, according to our research at the Center for Talent Innovation.  … Our study substantiated existing evidence that exclusion is a growing issue. We found that more than 40% of those we surveyed are feeling physically and emotionally isolated in the workplace.

HBR.com (Harvard Business Review) click the link to read the rest of the story.

How often do you ask your teammates how they are doing?Join the conversation on our Facebook Page!

Use a Cisco router? Patch it now ! It’s a 9.8/10 Security hole

Cisco is warning businesses that use its wireless VPN and firewall routers to install updates immediately due to a critical flaw that remote attackers can exploit to break into a network.  The vulnerability allows any attacker with any browser to execute code of their choice via the web interface used for managing Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router.

ZDNet.com click the link to read the rest of the story.

Have you made sure yours is patched?Join the conversation on our Facebook Page!

Trojan malware: The hidden cyber threat to your PC

A recent report from security company Malwarebytes reveals how trojans and backdoor attacks have rocketed in the past year. … “We’re seeing a new generation of stealers make an impact recently,” says Jérôme Segura, head of threat intelligence at Malwarebytes. … Gaining persistent remote access — be it to a single user’s computer, or a whole network — is key to many cyber attacks: if they’re stealthy enough, hackers can remain undetected for a long time, as they work towards their long-term goals.

ZDNet.com click the link to read the rest of the story.

Do you ignore these threats?Join the conversation on our Facebook Page!

 

There is no single solution to computer security

Anyone who regularly attends the Blackhat or Defcon conferences should understand that short of unplugging a computer system from its power source, it is not possible to rule out serious system and data compromise. There will never be any “silver bullets” to slay the security vulnerability werewolf.

Medium.com click the link to read the rest of the story.

How many layers of security do you have? Join the conversation on our Facebook Page!

Scalability and Automation – Why it is so crucial for your company

In every incubator, the founders say this sentence about 1000 times a day. “Scaling, scaling, scaling.”  But the smart founders … mean the following: Does your business model still work when you suddenly sell 3000 socks a day instead of 3? It is just one example.  Is your business model practicable if you have to supply significantly more customers?

Medium.com click the link to read the rest of the story.

Is your business model truly scale-able?Join the conversation on our Facebook Page!

Why We’re Bad at Estimating Time (and What to Do About It)

If you understand the reasons why we tend to underestimate how long tasks will take, you can take steps to avoid the pitfalls of the planning fallacy and start forming more realistic estimates. …

To avoid the negative consequences of underestimating—at both work and in life—you have to make an effort to stop estimating using intuition only. And the best way to do that is to use an estimation technique: an exercise designed to help you form more realistic estimates.

The following six estimation techniques are all designed to help you avoid underestimating when you’re trying to determine how much time a task will take.

Zapier.com click the link to read the rest of the story.

Were the estimation techniques discussed helpful?Join the conversation on our Facebook Page!

Severe vulnerabilities uncovered in popular password managers

Passwords stored in RAM could lead to theft, but the report has to be considered in a risk-based context. …

Independent Security Evaluators (ISE) published an assessment on Tuesday which documented the results of tests involving 1Password, Dashlane, KeePass and LastPass, all of which are popular password managers available today.

ZDNet.com click the link to read the rest of the story.

Do you use a password manager?  Are you concerned?Join the conversation on our Facebook Page!

You have around 20 minutes to contain a APT attack

Governments and private organizations have around 20 minutes to detect and contain a hack…

New statistics published today by US cyber-security firm Crowdstrike ranked threat groups based on their “breakout time.”  “Breakout time” refers to the time a hacker group takes from gaining initial access to a victim’s computer to moving laterally through its network. This includes the time the attacker spends scanning the local network and deploying exploits in order to escalate his access to other nearby computers.

According to data gathered from 2018 hack investigations, CrowdStrike says Russian hackers (which the company calls internally “Bears”) have been the most prolific and efficient hacker groups last year, with an average breakout time of 18 minutes and 49 seconds.

ZDNet.com click the link to read the rest of the story.

How quickly can your business respond to an attack?Join the conversation on our Facebook Page!

The Best Mind Mapping Software in 2019

Mind mapping is a creative exercise that begins when you write down a central idea or theme, then draw lines that branch out into new “nodes,” each with a new word or idea that’s related to the first. … Mind mapping is a creative exercise that begins when you write down a central idea or theme, then draw lines that branch out into new “nodes,” each with a new word or idea that’s related to the first.

Zapier.com click the link to read the rest of the story.

Have you used mind mapping tools, before?Join the conversation on our Facebook Page!

Why Online Privacy Matters and 5 Ways to Reclaim It

It’s the most common argument against privacy: “If you’ve got nothing to hide, you’ve got nothing to fear.” It’s also the silliest argument against privacy.

Privacy expert and author Daniel Solove has torn down this fallacy in his paper on the subject. But Solove’s essay is a complex take on a nuanced subject. Instead, the simple rhetoric of the “nothing to hide” argument is easier to repeat.

But no matter how little you have to hide, the implications of online privacy breaches are major. These few resources explain the pitfalls clearly and concisely.

MakeUseOf.com click the link to read the rest of the story.

What steps have you take to regain your online privacy?Join the conversation on our Facebook Page!

The Best Screen Recording Software in 2019

Text isn’t always an efficient way to deliver instructions, describe problems, or share knowledge. Writing out descriptions can take significantly longer than just showing someone your screen. But you’re usually not standing next to the person or people who need to see your screen.

Screen recording software solves this problem by recording whatever is happening on your screen, including the movement of your cursor. We evaluated more than 30 screen recording apps, and here we’ll present the 10 best.

Zapier.com click the link to read the rest of the story.

Have you tried Loom?Join the conversation on our Facebook Page!

Microsoft security chief: IE is not a browser, so stop using it

Is Internet Explorer (IE) a browser? According to Microsoft, no. Today, it’s a ‘compatibility solution’ for enterprise customers to deal with legacy sites that should be updated for modern browsers.  … Chris Jackson, Microsoft’s worldwide lead for cyber-security, … that habit needs to stop … ‘The perils of using Internet Explorer as your default browser’.

ZDNet.com click the link to read the rest of the story.

Are you still using IE because it’s cheaper?Join the conversation on our Facebook Page!

4 Ways Every Business Needs To Use Artificial Intelligence

What makes artificial intelligence systems so powerful is that, unlike purely statistical approaches, they can learn. That allows them to adapt when market behavior changes as well as continually improve performance as more data comes in.

Forbes.com click the link to read the rest of the story.

Are you using or considering using AI soon?Join the conversation on our Facebook Page!