Tech Insights

rss

Contributor Columns on Information Technology and Security

You were taught to share your toys as a young child, but this doesn’t apply to letting others use your Wi-Fi. The difference between sharing the plastic shovel and sharing the wireless connection is that with the latter, who’s to say that the “thief” won’t eventually crash in on ...

There is a lot of hard work that goes into running any business. And if you are a new business owner, trying to help a new startup business to transition from spending money to making money is one of the toughest things that you will ever do. As such, ...

The Russians have definitely come…in the world of cybercrime. A Russian ring of hackers has amassed 1.2 billion stolen passwords and usernames involving 400,000 websites. The criminals have also garnered 542 million e-mail addresses. And these Russians didn’t discriminate: Any website they could bust into, they did, ranging from big ...

What are these “botnets” you keep hearing about? Botnets (think roBOT + NETwork—gets you “BOTNET”) are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software—controlled by a solitary hacker or cybercrime ring. Hackers use botnets to execute a variety of cybercrimes like page rank sabotage, ...

You can legally purchase spyware and install it on your computer, but it’s against the law to do so on someone else’s device. Spyware records e-mails, chats, browser history, passwords, usernames, etc. You’d buy it for your computer if you wanted to know what your tween was up to on ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its