fbpx
Open post

Blockchain and it’s future

Blockchain, as Big as the Internet

Our society and its economy is run by many factors, so many it would be near impossible to keep track of them all mentally. However in all the various ways our economy works, the main factor is money. Always, money is the drive and in constant need, constant demand. So what if we took out our current understanding of money and replaced it with a fully technology based currency?

As our society progressed, we have watched an increase in it’s growth in ways that it could serve us and allow our lives to be just a little bit easier, most of the time at least. So it shouldn’t be too surprising that technology becomes the new form of currency. Heck we already have credit cards and online accounts and things that completely remove the physical interaction of money, this is just the next step.

Blocks chains are the topic of discussion once again due to its potential to change things around and put an end to our cash-based society.

Currently there are nations’ central banks looking into the idea of blockchains as a replacement currency from which people can buy, sell and trade from, a digital wallet of sorts.

So what could blockchains offer that our cash-based society cannot?

  • Anonymity- The ability to do any transaction without the fear of others keeping track of you. This means things like product sales marketing would become harder for businesses to do, at least in a specific manner. No longer would they be able to see that 24 year old males buy the newest dungeons and dragons manuals, and cater to that knowledge to pressure and increase their sales in some manner.
  • Convenience- From what the understanding is thus far, its basically like having a credit card on you 24/7 and always being an accepted form of payment, but without the card. This means if you have access to the web through any of the prominent devices, you have your money with you too. So no more excuse of “Oh, can you pay for this? I forgot my wallet at home again”.
  • Potential for growth- Blockchain is being compared to the internet itself in terms of it’s potential for growth and incorporation into our daily lives. Blockchain can be used by nearly every industry and business you could imagine. From small individual businesses to larger corporations, you name it. Blockchains can eliminate the paper trails and be recorded on the ledgers of a block chain, potentially opening lots of administrative opportunities.
  • Playing Catchup- Blockchains could actually help places that have been stuck in the past in terms of their recording methods and the way in which they function. For example hospitals which have cutting edge technology but still regularly use fax machines. Blockchain ledgers can really help our societies productivity become even across all areas, potentially shooting our societies capabilities forward as well.

Blockschains sure do seem to hold a lot of capabilities, so whats the problem? Why haven’t we taken advantage of these yet?

Well Blockchains still have some things that need to be addressed. For example, the fact that anyone in a blockchain can see the transactions that occur, even if you don’t want them to. Everyone outside the block cannot gain access and see transactions, but things like medical documents and all of that can be seen by those inside the blockchain where the transactions take place. This transparency along with the potential of being locked out of the blockchain for all eternity because you forgot the hash number resulting in a freezing of all the funds inside the chain, tend to put a wrench in the cog.

While blockchains hold immense and society altering potential, there are still very serious things that need to be addresses and accounted for before it really starts to integrate into our economy. However as we move forward with our days, we should keep an eye on blockchains and their current events to stay on top of potential they may hold.

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

give us a call or send us an email and let’s take a look at your system and its defenses!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Hackers backed by Lebanese government affect thousands

Once again, hackers have made the headline! Supposedly, some hackers backed by the Lebanese government have had a phishing scam in progress for several years.

Recently, a group of security researchers have discovered a simple but obviously effective hacking method, that has been linked to affecting thousands of people. The location of the hacks have been tracked back to a specific building in Beirut Lebanon.

The amount of data stolen over the several years of phishing that has been amassed is well into hundreds of gigabytes. So how is it this had gone on for so long and no one was the wiser? Apparently the phishing method was created through a recycled infrastructure and really no special means.

The security researchers from Electronic Frontier Foundation along with the security firm Lookout, accomplished a backtrack of the phishing malware and were able to gain insight into the database that had been amassed in Lebanon. The singular building that was housing the server for this phishing malware was Lebanon’s Intelligence agency. The researchers were able to asses that years worth of espionage took place not only in the US, but also more than 21 other countries. This news can be terrifying, considering the plausible outcomes from such actions, like the recent US presidential election and Russia’s involvement, as well as recent headlines involving hackers rooting from North Korea and attempting to gain cyber access to the upcoming Winter  Olympics.

It seems as time goes by, the ability to hack into other countries and gain information is becoming increasingly easy for everyone. Even hackers in the US that attack businesses and other such places have become so common and part of the norm, we don’t bat an eye now. There are many indications that our presence online can and at some point will be accessed by outside parties, and we need to ensure the strongest cyber defenses we can for our private securities sake, among other things like financial security.

don’t wait until you make the headline of a news article to understand the important of a secure online presence. Call Re2tech today and let us help you learn about your home or business network, and improve its security abilities.

Stay safe and careful what you post.

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Hospital in Greenfield held hostage to hackers

Late last Thursday, Jan 11th, a hospital in Greenfield had become the victim to a hackers malware. The malware was ransomware that had locked up their computer systems, preventing access to patient information and other necessary medical records.

Part of the Greenfield health network became locked down due to ransomware, preventing further medical action for more than 1,400 patients, who’s files were changed to the name “im sorry”. The hacker or hackers had given the hospital seven days to pay the ransom or the files would be encrypted permanently, causing huge issues for the potential safety of the patients who’s files had been locked.

An analysis since the attack was conducted and confirmed that no patient data had been stolen. The location of the hackers are believed to be somewhere in eastern Europe, stated Steve Long, the CEO of Hancock Health. The files affected by the ransomware could have been retrieved from a back up location, however the time it would have taken to recover that information would have been costly, so the ransom was paid.

The ransom amount was $55,000, through the currency known as Bitcoin, a cryptocurrency that is almost untraceable. Four bitcoins would be sufficient for the payment and would unlock the hospital records. Once the payment was received the hackers had released the documents and stayed true to their word. There is expectation that some of the technology will be a little off as a result from the outside hack, and there had been reports of a couple screens flashing the ransomware again, however it was only momentary and did not reactivate.

It was learned that the hackers had gained access through the hospitals remote-access portal, logging in with an outside vendors credentials. Initially it was believed that an employee had opened an email that contained the ransomware on accident.

As a response to the recent invasion, the hospital enlisted some help and knowledge from the FBI and cyber-security companies to ensure there is no residual affects, and inquire about other actions that could have been taken, as well as way to prevent the same problem from occurring again. As an added security measure, hospital leaders asked employees to alter their passwords  and implemented new software that can detect patterns indicating a similar attack may be on the horizon.

Luckily this hacker group or person had stayed true to their word, otherwise the files of patients would have been missing for a few days, possibly causing complications for patients and hospital employees alike. 2018 is turning out to be rough, and we are only 16 days in. Let’s all pull together and ensure our tomorrows are brighter than our yesterdays! Have a great week everyone!

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Russia inbound, hackers take a crack at Senate email

Recently announced, a Russian hacker group known as “Pawn Storm” has taken to the web for a bold attack on the Senate. In an attempt to gain email access, tensions rise in the US governments management of the continual Russian online invasions from hackers abound.

This hacking group has been known for its penetration of the Democratic National Committee and has been known to make many brazen attacks on US networks over the past eight months. One of the main focuses of the group is the Senates internal email system. This news is following the report of another Russian affiliated hacker group known as “Fancy Bear” attempting to hack into accounts dealing with the Winter Olympics.

Trend Micro. Inc. was responsible for bringing forth news of this recent hacking attempt and states that Pawn Storm’s attacks that began in 2017 has since set phishing sites that mimic active government directory services, causing issues for accountability. It was made clear however that despite the hackers attempts, the U.S. Senate ADFS server is not reachable on the open internet.

The hacking group has been making false identity accounts and emailing personnel that their password has expired, and since they take the guise of Microsoft Exchange, it’s harder to discern the real from the fake. There has been talk that Pawn Storm has been on the radar for four years, due to their involvement in phishing activity against political organizations in Iran, France, Germany, Montenegro, Turkey and Ukraine. It is believed that Pawn Storm wants to influence the public in some manner, and are searching for leak worthy information.

Cozy Bear, Pawn Storm and Fancy Bear are the three main hacking groups from Russia right now causing a ruckus in the online world. There is belief that Pawn Storm is linked to Russia’s military intelligence service. Other security firms who have had run-in’s with the other hacking groups, have made comments that they believe Cozy Bear and Fancy Bear are also sponsored by the Russian government.

Tensions rise online just 12 days into the new year. Hopefully there will be some cooling time before the next barrage of bad bear news! That’s all for today folks!

 

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Businesses beware of IOT devices

IOT devices pose a serious security risk!

These devices are products, other then computers, that connect to the internet. In this day in age it could almost be anything. For example IOT devices could be a fridge, or a Smart TV, or even some children’s toys! While Internet of Things devices may lead to more efficiency in our daily lives, research shows that consumers are exposed to many risks by the use of them. The most serious of the risks is disclosure of private information.

 

Here are some things to know regarding IOT devices:

  • Your devices can spy on you and your kids 
    -Many IOT device manufacturers show little regard for customer privacy, and some even make money from customer data.-Last year, the Norwegian Consumer Council found that a children’s doll recorded anything said to it by children and sent the recordings to a US company.
  • Many are vulnerable to hacking 
    -The same doll was also found to have a security flaw that allowed strangers to listen and even talk through the doll.
  • Your devices know your weaknesses
    -They have the potential to collect more intimate data about individuals than was possible with previous devices. This data could then be used to create profiles to give incredible insight into consumers, and can even predict their behavior.
    -The technology has gotten so advanced that these devices have the power to guess what mood we are in. This can be used to sell us products at times when our willpower is lowest.
  • The law may not protect you
    -The laws seem to be vary narrow and has significant limitations.

If you are a business especially this should be something you should be worried about. Depending on your business there is a pretty good chance you have plenty of devices in your building or office that are using this technology. That means you could have anyone listening in to your conference calls or business meetings ect. These devices pose huge security risks to you and your business, so you have to be aware!

If you have any questions about how you can improve the security at your business please contact us at Re2tech!

contact_us_button

Posts navigation

1 2 3
Scroll to top