Join Our Breach Prevention Program 

Start with a Free Dark Web Scan and Baseline Security Assessment. Your Protection is on Us!

Tech Insights

rss

Contributor Columns on Information Technology and Security

Fotolia_80058986_XS1.jpg

Burglars get burgled, muggers get mugged, and hackers get hacked. This includes a sophisticated ring of hackers: Hacking Team, hailing from Italy, specializing in selling hacking software to major governments. An article on wired.com describes how a “400 gigabyte trove” went online by anonymous hackers who gutted the Hacking Team, ...

For more than four years, malware has been posing as legitimate software and infecting industrial equipment across the globe. The malware, which looks just like the Siemens control gear software, has affected at least seven plants in the US. According to security experts, the malware was specifically designed to attack ...

Let’s cut to the chase: Regularly back up the phone’s data! If this is done every day, you won’t have to worry much about losing important information if something happens to the phone—such as a ransomware attack. Keep the phone’s software and applications updated. Delete apps you no longer ...

Hackers can take over someone’s life in a matter of hours. Just ask Patsy Walsh. Though she is not a tech savvy person, the grandmother of six did have a Facebook account, and that was all the hackers needed to take over her life. By using methods such as click ...

Get an account with TeamViewer, and you will have a software package that enables remote control, online meetings, desktop sharing and other functions between computers. But recently, customers of TeamViewer have reported remote takedowns of their computers that resulted in different forms of monetary theft, such as bank accounts being ...