Tech Insights

rss

Contributor Columns on Information Technology and Security

Hacking isn’t just about weak passwords and single-factor authentication. A lot of it occurs because people can be so easily tricked into giving up personal information: the craft of social engineering. Example: “Download this video of Kim K fully naked!” How many men would be lured into clicking this ...

What are these “botnets” you keep hearing about? Botnets (think roBOT + NETwork—gets you “BOTNET”) are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software—controlled by a solitary hacker or cybercrime ring. Hackers use botnets to execute a variety of cybercrimes like page rank sabotage, ...

The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s easy to see why hacker has a bad rep. The news is full of stories about hackers stealing data from large companies and the government. Hackers are the bad ...

Want to be invisible online? Get to know Tor. Tor will make you cyber-anonymous, concealing your cyber footprints, ID, browsing history and physical location. It even makes the sites you visit anonymous. Now, all that being said, there seems to be a concerted effort by certain US government agencies and ...

Just about everyone has private information that should be protected. Let’s begin with something you’ve surely heard of: antivirus protection. But this isn’t enough to guard your personal data. A free antivirus service may not even update automatically, and this is very important to keep up with rapidly evolving technology. ...

Two major trends in the technology industry are the movement of communications to all IP networks, while another major trend is the increasing prevalence of APIs (Application Programming Interface). In computer programming, an API specifies how some software components should interact with each other. Using a popular site like ...

“Cookiejacking” may sound like someone taking a bite out of that delicious chocolate chip cookie you were planning to have after lunch, but it is actually an online security risk that could lead to your personal information falling into the hands of a cybercriminal. But to understand this risk, you ...

I’m sure you’ve heard the news about Heartbleed by now (unless you’re in vacation wonderland and have taken a tech break). This is a serious vulnerability in the core of the Internet and is something we all should be concerned about. Heartbleed is a kink in encryption software, discovered by ...

Continuing IT Specialist's series of profiles on startups with new solutions or technology which we feel could be of interest to IT professionals, we are pleased to introduce Cumulogic.  Joining us today is Cumulogic Founder and and VP of Products Rajesh Ramchandan who has kindly taken the time to answer some of ...

IT Professionals deal with a variety of issues as the pace of change in the enterprise IT world is changing at perhaps's it's fastest pace ever. From cybersecurity to Cloud computing, IT departments are facing a number of challenges at once. One issue enterprises of all sizes are dealing ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its