Contact us

  • Home
  • /Archive by category ' News '

Archive For: News

Small Business a Huge Target for Hackers in 2017

Small Business a Huge Target for Hackers in 2017

2017 Ponemon Study: SMBs are Huge Target for Hackers: Negligent employees are the #1 root cause behind data breaches across North America and the UK Ransomware is hitting SMBs hard with more than 50% experiencing an attack Attacks are becoming costlier to businesses with damage now over $1M Keeper Security, Inc., the world’s leading password manager ... Read More
 
Why Every Leader Needs to Be Obsessed With Technology

Why Every Leader Needs to Be Obsessed With Technology

This article is part of a series exploring the skills leaders must learn to make the most ofrapid change in an increasingly disruptive world. The first article in the series, “How the Most Successful Leaders Will Thrive in an Exponential World,” broadly outlines four critical leadership skills—futurist, technologist, innovator, and humanitarian—and how they work together. Today’s ... Read More
 
10 Technologies Poised to Change the Future

10 Technologies Poised to Change the Future

The MIT Technology Review has released its annual list of innovations that will have the largest impact on businesses and society in the coming years. The list is expansive covering industries including healthcare, renewable energy, self-driving vehicles, new forms of payment, cybersecurity and new powerful computing technologies. The MIT Technology Review is gathered using input ... Read More
 
Small Businesses Lag in Cyber Security Readiness

Small Businesses Lag in Cyber Security Readiness

Small businesses are lagging behind larger companies in preparedness for attacks on their websites or computer systems. That’s the finding of a survey by Hiscox, an insurance company whose target market in the U.S. is small business. The survey released last week found that small businesses are less likely to make changes to their cybersecurity ... Read More
 
The Black Market Value of Your Hacked PC

The Black Market Value of Your Hacked PC

By Brian Krebs, Security Researcher A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants ... Read More
 
The 9 Most In-Demand Programming Languages

The 9 Most In-Demand Programming Languages

1.    SQL It’s no surprise SQL (pronounced ‘sequel’) tops the job list since it can be found far and wide in various flavors. Database technologies such as MySQL, PostgreSQL and Microsoft SQL Server power big businesses, small businesses, hospitals, banks, universities. Indeed, just about every computer and person with access to technology eventually touches something ... Read More
 
Quantum Computing and the Evolution of Encryption

Quantum Computing and the Evolution of Encryption

Fear sells in the computer security business. And in late 2015 Massachusetts-based Security Innovation got an unexpected boost from one of the scariest organizations around—the National Security Agency. For six years the company had been trying to create a new revenue stream by licensing an unusual encryption technology called NTRU, which it acquired from four ... Read More
 
Voice Command Hacks, Coming Soon

Voice Command Hacks, Coming Soon

Voice interfaces are becoming more ubiquitous and are now the primary input method for many devices. We explore in this paper how they can be attacked with hidden voice commands that are unintelligible to human listeners but which are interpreted as commands by devices. We evaluate these attacks under two different threat models. In the ... Read More
 
Your Router Can Be Hacked Into a Global Botnet

Your Router Can Be Hacked Into a Global Botnet

You might want to upgrade the firmware of your router if it happens to sport the Netgear brand. Researchers have discovered a severe security hole that potentially puts hundreds of thousands of Netgear devices at risk. Disclosed by cybersecurity firm Trustwave, the vulnerability essentially allows attackers to exploit the router’s password recovery system to bypass authentication ... Read More
 
Education, Planning and Investment Can Deter a Cyber Security Attack

Education, Planning and Investment Can Deter a Cyber Security Attack

The topic of cyber security becomes more complicated on a daily basis. The more businesses learn, the more they realize they don’t know. There is, however, a starting point for businesses of all sizes that are beginning to realize their vulnerabilities and invest in protecting their networks. According to the Bureau of Labor Statistics, 50 ... Read More