Uber paid off hackers in massive data breach cover-up
Uber is a company that has been in a PR tailspin for some time now. Between shafting their drivers in payments to the business that the company has siphoned away from traditional cab drivers, the corporation has not had a great public perception. Things weren’t helped by a massive data breach that exposed well over 57 million customers and their private data (such as names, email addresses, driver’s licenses, and phone numbers) to cybercriminals.
HONDA PLANT SHUTDOWN PROVES WANNACRY RANSOMWARE THREAT CONTINUES!
When a massive cybersecurity threat event like WannaCry ransomware occurs that captures public attention, there is always a larger response from security professionals to stop the bleeding.
RANSOMWARE PREVENTION: BUCKET LIST OF BEST PRACTICES
Ransomware, for quite some years now, has stopped merely being a part of cyber-fiction and is a dismal reality that has cost billions of dollars to unsuspecting, lethargic, and laggard
Is a Digital Geneva Convention in our future?
Malicious hacking and cyberattacks have been all over the news lately, from the dangers of Internet of Things products to the allegations of Russian intervention in the U.S. presidential election.
WannaCry: The implications of the largest ever ransomware Attack
Well, here we are as all members InfoSec community warned. The perfect storm of conditions has led to the largest ransomware attack in history. Over the weekend, according to The Hacker News, 99 countries and 200,000+ machines came under attack from WannaCry (as well as offshoots of it like WanaCrypt0r 2.0). This ransomware is based on the code in the leaked NSA malware.
Emerging networking technologies to keep an eye on
I’ve always been particularly fascinated by the power of networking computing devices together. Over the last several decades the hardware, software, and protocols that undergird how networks work have been evolving at an incredibly fast rate.
“Big, bigger, biggest”: Top big data trends for 2017
We hear a lot about big data and its influence on IT, enterprises, and various businesses. In fact, it is currently one of the most talked-about subjects in technology. With the advent of big data, the world is witnessing a major shakeup in the processing and analysis of data.
“Popcorn Time” ransomware: Infect your friends, get decryption keys
Think ransomware is already vicious and cruel? A new variant raise the ante on nasty. Ransomware is growing at an alarming rate. From your basic file encryption to entire hard drive encryption, coders of this malware are getting more creative as time goes on.
Which Flavor Of The Cloud Is Right For You
Secure data backup, greater reliability, better resource and growth management options, and improved collaboration are just a few of the reasons to take full advantage of cloud computing today.
Relying On A Good Luck Charm?
Carrying a four-leaf clover might work for leprechauns.
A Backup Plan You’re Sure To Fall In Love With
In today’s fast-paced, datadriven world, backups are mission critical to your company’s survival and success.
Upgrading To Windows 10? Avoid Headaches, Downtime And Frustrations By Following This Advice
For the past few months, we’ve been swamped with questions about Windows 10.
Missing Just One Of These Could Instantly Open Up Your Computer Network To A Cyber Attack
Welcome to the brave new world of cyberwarfare.
Last Chance To Save Up To $25,000 In Taxes On IT Software, Equipment And Services
While many tax incentives for small business have been shot down in recent years, Section 179 of the IRS tax code remains one legal “loophole” worth looking into.
3 Big Lies VoIP Salespeople Will Tell You To Get Your Money
Beware: The truth you need to make a good decision can be hard to come by. Here are a few “gotchas” to watch for when talking to VoIP system sales reps:
Cybercriminals Now Have A Bull’s-Eye On Small Business... Is Your Company’s Data At Risk?
In a December 2014 survey by the National Small Business Association, 61% of small businesses reported being victims of a cybercrime within the past 12 months.
Do You Keep Your Server In A Closet? If So, You Need To Read This Summertime Warning
Confusion. Dizziness. Fatigue. Muscle cramps. These are some of the first signs of heat exhaustion in humans.
The 5 Most Dangerous Pieces Of Information To Give In An E-mail
In the book Spam Nation, investigative journalist and cybersecurity expert Brian Krebs revealed the single most effective (and relied upon) way cybercrime rings gain access to your bank account, credit cards and identity. Ready for it? E-mail.
3 “Gotchas” Most IT Pros Won’t Tell You When Selling You Their Cloud Solution
Are you using any cloud applications to store data? Then listen up! There are a few “gotchas” you need to know about 3rd-party cloud apps that most sales reps will NEVER tell you.
Do I Need To Back Up Data That’s Already In The Cloud?
The compuing world is forever changing. Over the last 15 years, SaaS (software as a service) providers have offered the convenience of data backup for your cloud applications such as CRM systems, SalesForce, Google Apps and Microsoft 365.