fbpx
Open post

Blockchain and it’s future

Blockchain, as Big as the Internet

Our society and its economy is run by many factors, so many it would be near impossible to keep track of them all mentally. However in all the various ways our economy works, the main factor is money. Always, money is the drive and in constant need, constant demand. So what if we took out our current understanding of money and replaced it with a fully technology based currency?

As our society progressed, we have watched an increase in it’s growth in ways that it could serve us and allow our lives to be just a little bit easier, most of the time at least. So it shouldn’t be too surprising that technology becomes the new form of currency. Heck we already have credit cards and online accounts and things that completely remove the physical interaction of money, this is just the next step.

Blocks chains are the topic of discussion once again due to its potential to change things around and put an end to our cash-based society.

Currently there are nations’ central banks looking into the idea of blockchains as a replacement currency from which people can buy, sell and trade from, a digital wallet of sorts.

So what could blockchains offer that our cash-based society cannot?

  • Anonymity- The ability to do any transaction without the fear of others keeping track of you. This means things like product sales marketing would become harder for businesses to do, at least in a specific manner. No longer would they be able to see that 24 year old males buy the newest dungeons and dragons manuals, and cater to that knowledge to pressure and increase their sales in some manner.
  • Convenience- From what the understanding is thus far, its basically like having a credit card on you 24/7 and always being an accepted form of payment, but without the card. This means if you have access to the web through any of the prominent devices, you have your money with you too. So no more excuse of “Oh, can you pay for this? I forgot my wallet at home again”.
  • Potential for growth- Blockchain is being compared to the internet itself in terms of it’s potential for growth and incorporation into our daily lives. Blockchain can be used by nearly every industry and business you could imagine. From small individual businesses to larger corporations, you name it. Blockchains can eliminate the paper trails and be recorded on the ledgers of a block chain, potentially opening lots of administrative opportunities.
  • Playing Catchup- Blockchains could actually help places that have been stuck in the past in terms of their recording methods and the way in which they function. For example hospitals which have cutting edge technology but still regularly use fax machines. Blockchain ledgers can really help our societies productivity become even across all areas, potentially shooting our societies capabilities forward as well.

Blockschains sure do seem to hold a lot of capabilities, so whats the problem? Why haven’t we taken advantage of these yet?

Well Blockchains still have some things that need to be addressed. For example, the fact that anyone in a blockchain can see the transactions that occur, even if you don’t want them to. Everyone outside the block cannot gain access and see transactions, but things like medical documents and all of that can be seen by those inside the blockchain where the transactions take place. This transparency along with the potential of being locked out of the blockchain for all eternity because you forgot the hash number resulting in a freezing of all the funds inside the chain, tend to put a wrench in the cog.

While blockchains hold immense and society altering potential, there are still very serious things that need to be addresses and accounted for before it really starts to integrate into our economy. However as we move forward with our days, we should keep an eye on blockchains and their current events to stay on top of potential they may hold.

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

give us a call or send us an email and let’s take a look at your system and its defenses!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Android hacked and crypto mined

Android Defenses Breached

On to some more crypto-hacker news, Chinese researchers have found hackers to be turning internet connections into tools for creating caches of the crypto coin Monero.

The devices that have been recognized as being used in this manner are Android phones and TV’s. Thus far 7000 devices in Chine have been hacked and used in the aforementioned manner. The devices processing powers were used in conjunction with an internet connection to produce or mine more Monero coin.

Thought this strategy is new, there is talk that this form of attack will become common place in the near future. Almost everyone now a days has a computer or phone connected to the internet, meaning there are plenty of sources for this to occur. Computers, IoT devices, phones and tablets could all be vulnerable soon enough.

The lab that discovered this breach, Netlab360, stated that this device hacking was possible due to an open port, a function in a device that allows the operating system to communicate with the internet. The port 5555 was the main form of access and allowed the hackers to retrieve a list of Android devices that were unsecured. Once the infiltration was complete, the hackers had released a malicious software known as a worm, and not the kind that birds eat, the kind that would spread to other unsecured devices.

The port that was abused to achieve this attack was not opened by the unauthorized party, but rather hitched a ride. The 5555 ADB ports were reported to have been open already, however there is still an ongoing investigation as to why these ports would have been opened.

Moral of this story, use secured networks and ensure the security of your devices is in place.

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

give us a call or send us an email and let’s take a look at your system and its defenses!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Man attempts to sue T-mobile because of cryptocurrency

The Fall of a Crypto Exchanger

Cryptocurrencies have been gaining momentum in the last few years as an alternative means of currency. However due to the means by which cryptocurrencies exist, they are susceptible to abuse and have been many time en-counting.

Many news posts and articles lately involve the same old story of hackers gaining control of computers and demand a ransom in cryptocurrencies using ransomware, or hackers have stolen online crypto wallets, or really anything you could probably come up with. It seems like hackers and crypto have been a match made in heaven, and sadly a certain perturbed man would probably agree.

Carlos Tapang of Washington state blames T-mobile for it’s lack of responsibility when his account was hacked and his cryptocoins stolen. The hackers had hacked Carlos’ phone and then altered the password on a crypto account and transfered his coin into the BitCoin and cashed out, netting a probable $20,000. After the hackers had hacked the phone, they also cancelled his number and transferred to AT&T in which T-mobile was not able to recover for over a day.

The suit points the finger to T-mobile for being at fault because apparently T-mobile had stated they would be adding PIN codes to Tapang’s account but they never did. Not only that, but Carlos states that through multiple attempts hackers can gain access to accounts through calling T-mobile’s support line and that his leaves him still vulnerable, as well as many others. To support his claims, Carlos had brought statements of anonymous users online about similar breaches they had occur with their T-mobile accounts.

Carlos is suing under the allegations that the event has caused “emotional distress” and a lot of “time, energy and expense”, so he is seeking  damages and injunctive relief, which may result in additive security measures by T-mobile.

Crypto in all forms is a risky endeavor, and hackers are always on the watch for a new trick to play and coin to pull.

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

give us a call or send us an email and let’s take a look at your system and its defenses!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Tech Goliaths taking a lashing

We have all become painfully aware of the involvement of technology to our daily lives and how it has been keeping keep eyes on us for more information about our lives.

This has been particularly noticeable with Facebook, the social media giant through the use of Ads. If you decide one day your interested in getting a DVD player and you decide to search for some on the internet, the next time you go to Facebook the Ad’s you’ll see are for DVD players. At first this was creepy and unsettling, but then the mechanics behind it came to light and you couldn’t help but be impressed with their advertisement team.

As time has passed however, there have been stories of companies like Facebook and Twitter that had information floating around from news articles and fake news that caused an uproar. Social media giants have been taking a lash for their uncontrolled content and the effects it has played in society. Now we are seeing a more strict and invested reaction by these social media giants to prevent the same issues from occurring and to help keep their business model on track.

Social media giants aren’t the only companies being scrutinized for their actions or inaction’s. Companies like Google and Apple are also under fire for their role in the technological web of rule breaking. For example, apparently Apple had released an update that slowed the older models of their phones in hopes that customers would upgrade and generate income for the company. There has been a lot of slack by the government when it comes to keeping these rising tech giants within the confines of the law, but now it seems legislation has their eyes set on these tech corporations.

The biggest concern right now in terms of the technology we use today, is the health effects it has on our children. Companies have made it their goal for many years to increase the amount of time people use their products, and that goes for children’s applications as well. There is worry that children are too susceptible to the technology available to them and that may lead to development issues, and because of this, there is some questioning of the ethical development of such technology.

Technology is coming under wraps by the government more and more as time passes, and this could have some positive and poor effects depending on where your interests lay.

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

 

Open post

Coding and technology: Chance the Rapper showing our young how to get ahead

Take a Chance with technology

This past December , Chance the Rapper, the Chicago based Rapper known for his dedication to the younger generations and their success, made a visit to some unsuspecting youth.

The famous rapper made a visit to Adam Clayton Powell Paideia Acadamy with a goal in mind. Chance wanted to express the possibilities technology held for the younger generations and how learning coding and other forms of technical skills will be invaluable to achieving ones future.

Chance walked into a room full of 5th graders working diligently on their coding skills. As soon as Chance made his appearance the classroom boomed into awe’s, screams and tears. Chance has made it a point that coding has been a way for him to get into the industry and that the upcoming generations should also take advantage of the opportunities before them.

Chance stated that showing up, and actualizing yourself and ideas for people can be life changing, and that he hopes that showing up to this class will inspire the 5th graders to achieve what Chance has achieved, and more. Apparently Kanye west had visited Chance’s school when he was younger and that this event had a profound effect on chance and his ambitions.

During Chance’s visit to the Adam Clayton Powell Paideia Acadamy, Google announced a $1.5 million donation to Chicago Public Schools and SocialWorks which would be used for computer science education across the Chicago Public Schools.

Google.org’s principal Justin Steele was helping to direct the efforts and stated that it was exciting to see so many people interested in coding. That coding will not only provide the students with the ability to create content but also the platform and the tech involved.

It is truly amazing what can occur when the people pool their efforts and direct their passion.

 

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

 

Open post

Windows provides what Intel cannot

Big news hits the computer, updates sent out recently for Windows 10 are solving big problems caused by Intel’s patch.

Back on January 2nd, there was an announcement that Intel CPUs were having some serious problems in regards to its security vulnerabilities and that these issues stemmed from features of the CPU that was essential for performance. This issue was named Spectre. However there was another issue Intel users faced, and that was named Meltdown, which was essentially because a patch for Spectre would result in a slowing of the processors. That is exactly what the “solution” did.

Intel noted that the patch did indeed slow down processors, and saw that benchmark results were as significant as a 25%  drop in performance. The problems didn’t stop there.

Problems arose in the patch that was supposed to help. The patch resulted in some processors booting more often than they should, and generally without much any warning at all. Last week Intel announced a solution to the reboot issues, but it only affected some older processors.

So, that brings us to the current time. Intel has admitted that it’s latest patch for Spectre was basically worse than the bug it was made to fix. As a response, Windows has realeased an out-of-band patch for Windows 10, Windows 8.1 and Windows 7. This patch will disable the fix for Spectre variant 2. If you are experiencing the problem, you will need to manually download the update, as it is not automatic yet. You can find the link here.

Microsoft’s latest windows program update should stop the rebooting until Intel gets their game together and provides a proper update.

Check out the link and get your computer back in a somewhat working manner, then keep an eye out for the proper patch! It’s amazing how much heat Intel has been accumulating lately. Hopefully the future bodes a different story.

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Cisco has a severe VPN bug, Patch immediately!

This just in, Cisco, the “worldwide leader in IT and networking”  has a severe but, that has been rated a “10 out of 10” by a security researcher.

The bug has to do with Cisco’s ASA software (Adaptive security Appliance). This bug is identified as a severe double-free vulnerability that is located in the Secure Sockets Layer VPN.  The danger in this vulnerability of the VPN service, is that an unauthenticated person may gain access via remote, and gain the ability to reload an affected system, or remotely execute code.

Furthering the potential danger, if an unauthenticated person were to use a specially crafted XML packet, they could gain complete control of the affected system. This information is all from Cisco’s advisory which is now lighting up the net.

As for the rating that is applied with this bug, which is identified as “CVE-2018-010”, there is a scoring system that indicates the vulnerability level of such bugs, and it was indicated that this specific bug rates a full 10 out of 10 on the scoring system.

Cisco want’s to stress that the bug is only exploitable if the ASA devices have the webvpn  feature enabled. Users may check this setting and ensure it is disabled by following the command-line interface instructions that is being provided by Cisco. Those commands can be found here.

The following is a list of known vulnerable technology:

  • 3000 Series industrial Security Appliance (ISA)
  • ASA 5500 Series Adaptive Security Appliances
  • ASA 5500-X series Next-Generation Firewalls
  • ASA Services Module for Cisco Catalyst 6500 Series Switches
  • Cisco 7600 Series Routers
  • ASA 1000V Cloud Firewall
  • ASA Virtual appliance (ASAv)
  • Firepower 2100 Series Security Appliance
  • Firepower 4110 Securtity Appliance
  • Firepower 9300 ASA Security Module
  • Firepower Threat Defense Software (FTD)

The bug is also known to apply to Cisco’s first remote access supported VPN, FTD 6.22 which was released last September. Versions before FTD 6.22 are not vulnerable.

You can check which versions you have through the instructions provided by Cisco here.

As of right now there are no known attacks involving this vulnerability, however Cisco is expecting reports of abusing this vulnerability.

Go check your systems and patch what you can. Stay vigilant in your defenses and don’t open any phishing emails!

 

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

The state of our technology

As time goes by so too does the improvements in technology. I’m certain most of you have heard or noticed that technology skyrocketed upward through our lives. The technological advancements made in the past ten years alone have been profound, grand achievements that show a promising, yet possible terrifying future for the world.

We often see technology news and technology articles that tend to be counter parts. News headlines like “Technology will surpass the human race” and Technology will save the human race” are both in abundance.  These titles stem from the varying paths that are making headway in this technological boom.

On one hand we have advancements like robotics technology which could completely replace the need for human manufacturing jobs. This is both a blessing and a curse, for workers aren’t working in jobs that are hazardous to their health, however they won’t be working anymore at all. There are a wide range of people who have only known the work grind in manufacturing jobs, and without them, those people are basically starting from the beginning.

On the other hand we have technology that is integrating Eco friendly methods and sometimes completely self sustaining methods to technology. Most noticeably technology that involves the production of power. Many a places across the globe have turned off their nuclear plants or coal plants and switched to forms of power that do not have ill affects towards the earth and it’s inhabitants.

There are many many many more examples for both sides and will continue to be until the end of mankind. This is why there is such a stark difference between the idea of technology and it’s evolution. People have very little basis of security in relation to technology, we just can’t keep up. For example, society has only recently in the last couple years accepted the idea of video games as a normal part of entertainment. Scientific studies on their affects on people in both long term and short term only recently been making headway, but now virtual reality gear has broke into society and new branches of study groups are being formed to take a look at the psychological affects that are present when using such technology. Video games are the least prominent example where technology is eclipsing the speed at which humans can keep up.

In our recent article we covered some development of a program created to prevent and locate hackers before harm can be accomplished in a network. There are so many technological advancements being made each day, the standards are rising more and more and becoming more and more complex in some areas and more accessible in others.

The best thing we can do is pay attention to these developments and understand how each of these break through’s will affect our daily lives. Technology is a beautifully scary area, but ultimately we will decide what becomes the prominent path it takes.

 

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Hackers Beware

I know you are all tired of seeing the word “hacker” everywhere. But to be honest, i’m certain it will only become more relevant as we move forward. Due to hackers playing such a prominent role in the modern world, our constant efforts to fight hackers and the ransomware and malware they bring forth will for the foreseeable future be a relevant topic.

This is where the wonderful news comes into play.  A program involved in the pursuit of technological advancements and it’s uses for human safety has taken the initiative in pursuing hackers before they can attack. The latest project from Alphabet’s X moonshot program has started a venture called “Chronicle”. Chronicle is tasked with locating hackers at a speed faster than any human currently can.

Alphabet is the parent company of Google, and stated on Wednesday that Chronicle would branch off and become it’s own company, and finding hackers, it’s main objective. The Chronicle company will develop hacker locating tools and machine learning tools to enhance the locating programs, to increase hacker localization.

Now I know what your thinking “There are plenty of cybersecurity firms already out there, so how is this any different?”. Well, Chronicle claims it may have an advantage above the currently live cybersecurity firms. The head of the Chronicle initiative stated, that by giving organizations a higher resolution of their security situation with the combination of machine learning, large amounts of computing power and storage, they believe they will be able to root out the false alarms that arise in cybersecurity due to the overwhelming amount of data. By preventing these false alarms, and being able to sift through the data of a network at a faster rate, they will be able to identify vulnerabilities and provide stronger security, that may be able to locate hackers before they have a chance to even attempt a deep hack.

This news is very exciting to an optimist like myself. Seeing news on a group that is fighting back against the online terrors and possibly providing a solution to smaller organizations and homes would be a fantastic accomplishment! Can you imagine a day when “hackers” become a term of the past and malicious malware activity becomes extinct? Ok maybe that is too optimistic. Anyway, in the meantime, we need to stay vigilant and on top of our networks! We at Re2tech have the luxuries of a small business, but the experience and work ethic of the bigger businesses! Give us a call today and let’s make I.T. happen!

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Posts navigation

1 2 3 4 5 6 7 12 13 14
Scroll to top