IT Specialist Blogs

rss

News, Topics and Opinions on Information Technology

Specify Alternate Text

If you think there’s like a million apps out there, that’s not exactly an exaggeration. For sure, there are more than you can imagine, which makes it easy to conceive that many certainly come with security problems. In fact, out of the top 25 most popular apps, 18 of them ...

Specify Alternate Text

In this day and age, we should never hear someone proclaim, “Oh my God, my computer crashed! I lost everything!” You can’t lose something that’s been properly backed up. So many people, including ones with businesses that rely upon cyber communication, continue to avoid backing up their digital data. Nobody is ...

Specify Alternate Text

Is it Bank of America’s fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Washington hospital were broken into via cyberspace. Bank of America got back about ...

Specify Alternate Text

It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate. Passwords Being that cyber crime has been a fixture of modern living for over a decade, you’d think that everyone and his brother would know to use strong, ...

Specify Alternate Text

When making goals, it’s important to emulate people who have already mastered what you’re trying to learn. So in this case, what do super secure people do to stay safe online? Intel Security has the answer—here are the 5 habits of practically unhackable people: Think before ...

Specify Alternate Text

Billions and billions—it’s only a matter of time before this becomes the number of hacking incidents in a single year, because just in 2014, over one billion records were hacked out of 1,500 different hacking incidents, says a recent report.  Some other findings from the report: A ...

Specify Alternate Text

If you’ve ever watched virtually any spy flick or James Bond movie you’re familiar with “bugs” – those little dime-sized metallic things that the bad guys would secretly stick under someone’s desk to record any conversation in the room—picked up by a receiver in their car. Or, the phone ...

Specify Alternate Text

These days, it is hard to pick up a newspaper or go online and not see a story about a recent data breach. No other example highlights the severity of these types of hacks than the Sony breach late last year. While a lot of information, including creative materials, financials ...

Specify Alternate Text

Does your Lenovo computer have Superfish VisualDiscovery adware (a.k.a. spyware) installed? It’s possible if you purchased a Lenovo PC any time in September of 2014 and thereafter. This Superfish software intercepts the Lenovo user’s traffic so that the user sees ads displayed that reflect their browsing habits. The problem with ...

Specify Alternate Text

As the scandal over NSA spying has unfolded, like a drip coffee pot, one revelation after another has come out revealing the extent to which the NSA possesses the power to pry into our private lives. In the latest NSA hack to emerge, we’ve discovered that the agency – ...

Interested in submitting content for publication and syndication on the IT Specialist Network?

As a contributing writer on the IT Specialist Network, you can quickly gain exposure as an opinion leader or subject matter expert in information technology by informing a large audience of technical professionals. We welcome new and established authors that specialize in one or more sectors of the IT industry. Once your article(s) is approved for publication, it will be selectively syndicated throughout the IT Specialist Network.

Click here to contact us.