Translate this page using the Google Translator button above!
IT Specialist Blogs
Interested in Blogging on IT Specialist.com? Please contact us!
Gain Insight from Industry Leaders Interviewed by IT Specialist.com
Over 6,000 Members
On Demand Archives (Webcast)
Contributor Columns on Information Technology and Security
Want to earn up to $4.2 million? Then find the hackers on the FBI’s most wanted list. Or at least give the FBI information leading to their arrest and/or conviction. These snakes have stolen hundreds of millions of dollars. Here is the list from the hackernews.com:
Evgeniy Mikhailovich Bogachev (reward: ...
Hackers and wannabe hackers can easily purchase cheap tools of the trade online. The security firm Dell SecureWorks Inc. confirms this in their latest report and adds that underground markets for hackers, including those from Russia, is thriving.
The “Dark Web” is the go-to place for hackers looking for guidance ...
A visual hacker can infiltrate you—from the outside in. Quite literally, a person (ranging from a snoop to a cyber criminal) can peer over your shoulder while you’re using your computer or mobile (“shoulder surfing” or “visual hacking”), and collect your personal information—whatever you have up on the screen. ...
Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business.
On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and doing some research using Amtrak’s free wireless Internet. “Free” usually translates to "unsecured," ...