The Ransomware attack that makes you “WannaCry.” Will it happen again?

Thousands of organizations from around the world were caught off guard by the WannaCry ransomware attack launched Friday. As this rapidly spreading threat evolves, more cybercriminals are likely to attempt to profit from this and similar vulnerabilities. As a ransomware program, WannaCry itself is not that special or sophisticated. In fact, an earlier version of the program was distributed in March and April and, judging by its implementation, its creators are not very skilled.

Continue reading

14 of the coolest tech gadgets for 2017

Bestproducts.com just came out with their list of the 100 best tech gadgets for 2017, and we’ve culled that list down to the 14 we (frankly, non-gamer types) would likely use, or want to use (depending on the price tag). Click on any product name for buying information. Tell us what you think of our shorter list:

Continue reading

Who really owns your social media postings?

More often than not, people sign up for social media accounts without reading the particular platform’s terms of service. As a result, they are usually completely unaware of the conditions of use or the rights they have signed away. Do you really know who owns your Facebook account or your Instagram profile picture?  If not, you may be surprised to discover the reality as we break down the terms that you have agreed to on various social media platforms.

Continue reading

Is there such a thing as a “good” hacker?

In the coming year, there will be more intricate and complex data integrity attacks, with the main motivation being financial gain and/or political manipulation. Private enterprises and public entities are looking for ways to better protect information and preserve the integrity of their data, while individuals want to ensure that the internet remains open and provides equal access to information to all. People are now being recognized as a powerful tool to solve these problems. As a result, the negative perception surrounding hackers is shifting. Most large technology companies run notable bug bounty programs, including Google, Apple and Tesla. Recently the U.S. government added programs such as “HackthePentagon”and “HacktheArmy,” and the recent Department of Defense Vulnerability Disclosure Policy. In ride the “Ethical Hackers” – the new white knights of the cybercrime world. So. what makes a good hacker?

Continue reading

Cyber criminals going old-school

Complex cyberattacks cost a cyber-criminal a fair amount of money to create and carry out. And the costs are only rising. This has prompted many to return to old-fashioned email tricks to bring in some needed cash. Complex state-on-state cyberattacks and hacking tools like those revealed by Wikileaks (where the CIA can turn TVs into covert eavesdropping tools) are not going away, but you don’t have to be an elite programmer and hacker to make money using ransomware or simply stealing data. Email can be used expediently and effectively.

Continue reading

Will This New Battery Revolutionize Our Phones and Cars?

The co-inventor of the lithium-ion battery says he has developed a safer battery that lasts three times longer than those currently in use in our mobile devices and many newer electric cars. In research published in the March edition of the journal Energy & Environmental Science, and in a filing with the U.S. Patent and Trademark Office, John Goodenough and colleagues at the University of Texas report that their new battery technology could produce a safe, non-explosive cell with charging times measured in minutes, not hours.

Continue reading

How Down Time affects Enterprises

Veeam® commissioned a survey over 1,000 global IT decision makers to gain a better understanding the impacts service Availability has on enterprises. Overall, there appears to be an alarming amount of under-protected and unrecoverable data in organizations that costs, on average, $21.8M each year due to downtime.  This reflects a as a 36% increase YOY – a move in the wrong direction. Enterprises must start accelerating their implementation of data protection solutions to reduce lost time and money.

Continue reading