Category Archives: News

  • Patches, Patches and More Patches!

    Posted on December 14, 2018 by in News, Security

    At least three companies released software patches this week: Google for Chrome, Microsoft and Adobe. Adobe today released patches for 87 vulnerabilities affecting its Acrobat and Reader software products for both macOS and Windows operating systems, of which 39 are rated as critical and 48 important in severity. Adobe’s Patch Microsoft today, on its year-end […]

    Comments Off on Patches, Patches and More Patches! Continue Reading...
  • Wi-Fi Security Issues – A 5-Step Guide on the Common Threats and How to Manage Them

    Posted on December 7, 2018 by in News, Security

    Today’s Wi-Fi networks are now more secure than the typical wired network in the same building. While that may seem like a bold opening statement, today this is often the case. It is true that WLANs got off to a chequered start 20 years ago, with attackers finding ways around the early security procedures and […]

    Comments Off on Wi-Fi Security Issues – A 5-Step Guide on the Common Threats and How to Manage Them Continue Reading...
  • Half of all Phishing Sites Now Have the Padlock

    Posted on November 30, 2018 by in News, Security

    Maybe you were once advised to “look for the padlock” as a means of telling legitimate e-commerce sites from phishing or malware traps. Unfortunately, this has never been more useless advice. New research indicates that half of all phishing scams are now hosted on Web sites whose Internet address includes the padlock and begins with […]

    Comments Off on Half of all Phishing Sites Now Have the Padlock Continue Reading...
  • 5 Advantages (and 1 Disadvantage) of Zero Knowledge Authentication

    Posted on November 16, 2018 by in Data Center, News, Security

    As data breaches continue to make the headlines, better encryption is one of the ways to keep data safe and private in the data center. Learn about zero knowledge authentication and why you may want to make it a key component to your data center security protocol. What is zero knowledge authentication? As with most […]

    Comments Off on 5 Advantages (and 1 Disadvantage) of Zero Knowledge Authentication Continue Reading...
  • Edge Computing: The 2 Things Tech Leaders Should Know

    Posted on October 23, 2018 by in Cloud, News, Security

    It’s no secret that more and more computing workloads are moving to the cloud, and will continue to move to the cloud in the years ahead. In 2018, 10% of companies have shut down their traditional data centers in favor of the cloud. By 2025, that number will be 80%, according Gartner. But this centralization […]

    Comments Off on Edge Computing: The 2 Things Tech Leaders Should Know Continue Reading...
  • The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

    Posted on October 8, 2018 by in News, Security

      In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic […]

    Comments Off on The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies Continue Reading...
  • The Top 5 Reasons Hackers Love Data Centers

    Posted on September 10, 2018 by in Data Center, News, Security

    Do you think your data center’s impervious to a physical attack or a cyberattack? Think again. From the human element to the increasing number of global cyberattacks, your data center is vulnerable. The worldwide cost of cybercrime is estimated to reach $6 trillion annually by 2021, which means that it’s not about if your data center […]

    Comments Off on The Top 5 Reasons Hackers Love Data Centers Continue Reading...
  • What Is the Definition of a Data Breach, and Does Ransomware Count?

    Posted on August 20, 2018 by in News, Security

    Ten or twelve years ago, IT security companies warned of the possibility of a catastrophic data breach, but there were far fewer real-world examples than there are today. Now, it seems that some new breach comes to light every week, sometimes more than one a week. Data breaches can affect a wide variety of data: […]

    Comments Off on What Is the Definition of a Data Breach, and Does Ransomware Count? Continue Reading...
  • Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M

    Posted on August 1, 2018 by in News, Security

    Hackers used phishing emails to break into a Virginia bank in two separate cyber intrusions over an eight-month period, making off with more than $2.4 million total. Now the financial institution is suing its insurance provider for refusing to fully cover the losses. According to a lawsuit filed last month in the Western District of […]

    Comments Off on Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M Continue Reading...
  • How to Easily Switch Your Two-Factor Security to a New Phone

    Posted on July 24, 2018 by in News, Security

    When you’re switching phones after an upgrade or an accident, the job of checking up on your two-factor verification apps can get lost in the hustle of transferring photos, contacts, messages, and all the other stuff that more quickly comes to mind. Without your security codes, though, you might get locked out of your key online […]

    Comments Off on How to Easily Switch Your Two-Factor Security to a New Phone Continue Reading...