Your Tech News!

Four Major Keys to a Strong Password

Four Keys to Creating a Non-Hackable Password Creating passwords has never been an easy task. Deciding what word(s) or phrase to use is an eternal struggle, and then adding special characters like capitalization, punctuation or numbers to that is just a disaster for remembering the password. Generally we hear stories about people who used simple

Read More »

Sextortion Scams Fueled by Passwords

Some online hackers have scored a large sum of cash after scamming victims with their passwords We all do it. We open our email and see a message from someone or something familiar, however it seems out of nowhere and the topic line does not make a whole lot of sense. We want to open

Read More »

Microsoft Releases ‘Teams’ For Free

Microsoft has released a free version of Teams with their Office 365 Recently, as a celebration of the one year anniversary of the release of Microsoft’s Office 365, Microsoft has released a free version of Teams. This free version is accessible in over 40 languages and was designed for small businesses and groups that don’t

Read More »

Windows new update helps fix Intel’s downgrade

Big news hits the computer, updates sent out recently for Windows 10 are causing big problems. Back on January 2nd, there was an announcement that Intel CPUs were having some serious problems in regards to its security vulnerabilities and that these issues stemmed from features of the CPU that was essential for performance. This issue

Read More »

Exchange Online Changes Incoming

Shared and Resource Mailbox On June 21st the Microsoft Exchange Team had announced on their blog that they will be “correcting” the way their newly created shared and resource mailboxes would function, also properly fixing the currently existing mailboxes as well. From 100GB to 50GB When Microsoft says “fixing” they are referring to a problem

Read More »

LTE Flaw Invites Hackers

LTE (Long Term Evolution) Recently there has been talk of hackers finding a way in which they can see through your eyes when it comes to your cell phone and websites your browsing.  But how is this accomplished? Through a recently discovered flaw in the Long Term Evolution (LTE) Network. What is LTE? LTE is

Read More »

Why SSL is So Important on July 2018

SSL In the past couple of months there has been a lot of talk about the need for SSL (Secure Sockets Layer) on websites before this coming July of 2018. The talk however is growing more and more the closer we get to July and there are some hosts panicking in the face of the

Read More »
VPN, virtual private network

VPNFilter Malware worse than we thought

  Recently we created an article giving a detailed explanation on a current threat facing over 500,000 devices, known as the VPNFilter malware.This malware had become a prominent issue fast and had been tied to an origin in Russia. Initially it was thought that resetting your homes router and modem would address the problem, but

Read More »

Analysis of VPNFilter botnet

EL5 As we move forward in our technological advancements, there will be a concurring rise in damage that results from technological attacks. The more interconnected we become, the more vulnerable we are when a new form of threat arises. VPNFilter demonstrates how cybercriminals advance with the new technology and integrate degrees of portability by building

Read More »
EU General Data Protection Regulation

GDPR Rolls Out

GDPR Is Active The 25th has arrived in the EU and that means that the GDPR is released and active, as well as already drawing up some paper work for lawsuits against companies that are not readily complying with the new regulations. The GDPR is all about “privacy by default” meaning that a product or

Read More »

The Cost Of GDPR

March 25th halting the march of some companies As the GDPR marches forward there has been alot of talk about it’s affects on the smaller companies that don’t have the capabilities to rework their entire infrastructure of their products and systems. Europe’s new data protection law has seen many companies decide to call it quits

Read More »
EU General Data Protection Regulation

GDPR Inbound

What is the GDPR and who does it affect? As of late there has been quit alot of mention about the “GDPR” across business, technology and government articles, mentioning how the GDPR will turn the tech world and all things consumer information on it’s head. But what does that actually mean? It’s important to know

Read More »

Hackers and Emails

Emails in 2018, still vulnerable Emails have always had a fickle feeling security. Often we see and hear news about peoples emails getting hacked and losing vital personal information or important business information. Even in our government we have seen multiple occasions when high ranking officials have lost access to their email or had it

Read More »

Sprint Merging With T-Mobile

The Rumors Are True For a while now, many people including myself thought that Sprint and T-Mobile were so similar that they were the same company. Without ever taking the time to actually examine this, we now don’t have to because its about to be the truth. Sunday April 29th, it was made official that

Read More »

The Infinite Scroll

Void Filled Screen Distractions are a drag, but sometimes, they are a scroll. We have screens in almost every location we look, to provide us with information of some sort, be it advertisements or current event updates. Because of this, we as a society have become strongly attune to screens and involved with the information

Read More »

Blockchain and it’s future

Blockchain, as Big as the Internet Our society and its economy is run by many factors, so many it would be near impossible to keep track of them all mentally. However in all the various ways our economy works, the main factor is money. Always, money is the drive and in constant need, constant demand.

Read More »

Android hacked and crypto mined

Android Defenses Breached On to some more crypto-hacker news, Chinese researchers have found hackers to be turning internet connections into tools for creating caches of the crypto coin Monero. The devices that have been recognized as being used in this manner are Android phones and TV’s. Thus far 7000 devices in Chine have been hacked

Read More »

Man attempts to sue T-mobile because of cryptocurrency

The Fall of a Crypto Exchanger Cryptocurrencies have been gaining momentum in the last few years as an alternative means of currency. However due to the means by which cryptocurrencies exist, they are susceptible to abuse and have been many time en-counting. Many news posts and articles lately involve the same old story of hackers

Read More »

Tech Goliaths taking a lashing

We have all become painfully aware of the involvement of technology to our daily lives and how it has been keeping keep eyes on us for more information about our lives. This has been particularly noticeable with Facebook, the social media giant through the use of Ads. If you decide one day your interested in

Read More »

Windows provides what Intel cannot

Big news hits the computer, updates sent out recently for Windows 10 are solving big problems caused by Intel’s patch. Back on January 2nd, there was an announcement that Intel CPUs were having some serious problems in regards to its security vulnerabilities and that these issues stemmed from features of the CPU that was essential

Read More »

Cisco has a severe VPN bug, Patch immediately!

This just in, Cisco, the “worldwide leader in IT and networking”  has a severe but, that has been rated a “10 out of 10” by a security researcher. The bug has to do with Cisco’s ASA software (Adaptive security Appliance). This bug is identified as a severe double-free vulnerability that is located in the Secure

Read More »

The state of our technology

As time goes by so too does the improvements in technology. I’m certain most of you have heard or noticed that technology skyrocketed upward through our lives. The technological advancements made in the past ten years alone have been profound, grand achievements that show a promising, yet possible terrifying future for the world. We often

Read More »

Hackers Beware

I know you are all tired of seeing the word “hacker” everywhere. But to be honest, i’m certain it will only become more relevant as we move forward. Due to hackers playing such a prominent role in the modern world, our constant efforts to fight hackers and the ransomware and malware they bring forth will

Read More »

Hackers, and their modern day affect

The government has always had a side of it that is less than reputable, usually when it involves the interference of other countries and governments under the guise of “for our own good”. However as of late, it seems the government isn’t what we need to worry about when it comes to interference in others’

Read More »

Hackers backed by Lebanese government affect thousands

Once again, hackers have made the headline! Supposedly, some hackers backed by the Lebanese government have had a phishing scam in progress for several years. Recently, a group of security researchers have discovered a simple but obviously effective hacking method, that has been linked to affecting thousands of people. The location of the hacks have

Read More »

Hospital in Greenfield held hostage to hackers

Late last Thursday, Jan 11th, a hospital in Greenfield had become the victim to a hackers malware. The malware was ransomware that had locked up their computer systems, preventing access to patient information and other necessary medical records. Part of the Greenfield health network became locked down due to ransomware, preventing further medical action for

Read More »

Hackers hit Lumen cryptocurrency wallets

January 13th, all was right, until a sneaky little hacker came crawling in the night. To steal and plunder, wallets oh wonder, riches they desire watch them set fire. So basically, hackers have stolen crypto wallets from the Stellar Lumen currency. Thus far there has been no claim as to who has stolen the wallets

Read More »

Russia inbound, hackers take a crack at Senate email

Recently announced, a Russian hacker group known as “Pawn Storm” has taken to the web for a bold attack on the Senate. In an attempt to gain email access, tensions rise in the US governments management of the continual Russian online invasions from hackers abound. This hacking group has been known for its penetration of

Read More »

McAfee twitter account hacked, cryptocurrencies may be next

Everyone knows of the virus security program McAfee, so that will make this information a little funny, but the cyber security expert John McAfee’s twitter account had been hacked. This curious turn of events had occurred in order to promote specific alternative cryptocurrencies to invest in. Last week, McAfee’t twitter account had been hacked and

Read More »

Hackers take aim at the Winter Olympics

2017 was a big year for technology and it’s hacking abusers. With the new year already in progress we were all hoping for a nice downtime from the bad news and potential dangers. Sadly that isn’t the case right now. Recently reported were attempts of maleware infection affecting those involved in the Pyeongchang Winter Olympics.

Read More »

Googles discovered CPU vulnerabilities, and how it can affect you

Google is a forerunner in the online world for many aspects, but one of the main focuses of Google is security. Google has a “Project Zero” team dedicated to researching vulnerabilities their customers may be facing while also doing their best to provide solutions to the problems. Last year the Project Zero team had come

Read More »

Smartphones with breach options, new option discovered

Smartphones are the present and the future, there is no doubt about that. They offer an immense control in a life and helps people stay up to date on what people are eating and how close WW3 is. It’s no surprise this is also the same device that is the target of hackers and the

Read More »

Forever 21…for the hackers with new credit card information

Hello all! We hope everyone had a nice relaxing holiday before the new year was rang in! Unfortunately during the holiday rest, someone got a little too relaxed. The known clothing company “Forever 21” was a victim of another security breach for the 2017 year. The popular clothing store had apparently been hit with malware

Read More »

Cloud security going into 2018

The cloud is becoming more and more preferred as times goes by. Data and applications are streaming to it at a faster rate every hour, and more people are deciding to turn to cloud services on a daily. There is no question as to why this is happening, the cloud services are extremely convenient and

Read More »

2018 predictions: Healthcare security breach

As we all have become aware, 2017 was a free for all when it comes to security breaches.  There were countless phishing scams, ransomware, state-sponsored attacks and new forms of attacks that all made headlines and shook us to our boots. However 2018 means a new year and a new us! Right? Well we hope

Read More »

2018 security expenses expected to rise in response to 2017

2017 was full of news on companies and corporations that had security breaches, and the effects on the masses that would follow because of them. Because of this hard pressed security year, it is expected that in 2018, the total expenses on security spending will rise, by about an estimated 8%. A research firm known

Read More »

The most popular passwords, proven by hacked accounts

So apparently, every year SplashData compiles a list of passwords and rates them according to occurrence. These passwords are from accounts that have been stolen and made public. There are millions of these accounts and the similarities in the passwords show the unoriginal ideas people come up with to secure their information. Due to the

Read More »

Net neutrality and the FCC’s use of deceased people’s name

Lately the internet has been abuzz about net neutrality and preventing it from being stolen from us, lest we want to see a degradation in our society. Even knowing this, and having sent the FCC millions of petitions and signatures, the chair of the FCC still ignored the pleas of the masses and voted for

Read More »

Companies who have been breached are still confident in their defenses

There has been a lot of articles and news covering companies and businesses who have security breaches and had people’s vulnerable information out in the hands of some hackers. Despite this news, APAC organisations are still confident in their online security measures, and feel like they don’t need to change or enhance those measures. Fortinet

Read More »

Follow up information on the Uber data breach

Earlier today, it was made public the specifics that were stolen during the Uber data breach. Uber gives a more in-depth idea of the information accessed by the hackers, giving customers and drivers a stronger understanding of their vulnerability. Some U.S. senators have been hounding Uber for more information on their security breach and what

Read More »

HP laptops pre-installed with keyloggers

Recently made public by a security researcher by the name of ZwClose, is the unfortunate mishap affecting some of the HP laptops. Supposedly in the past there have been complaints about HP leaving key loggers installed on laptops, posing a potential danger to those whose laptops are involved. Key loggers that could allow hackers to

Read More »

Breaking news! Everything keeps breaking! Here we go again…

Another day another security breach! But where at this time you may ask? A cryptocurrency company known as NiceHash. Early Wednesday, it was discovered that hackers had breached the bank of NiceHash and stolen potentially millions of dollars in bitcoins. It was made known that most of the funds stolen belonged to the customers of NiceHash.

Read More »

PayPal acquires TIO networks but with a cost

Just hours ago, it was made public that PayPal has had a security breach due to their newly acquired networks company TIO. Back in February, Paypal had acquired TIO Networks in hopes of introducing the TIO customers to PayPal’s services. This attempt at bolstering their user numbers has actually backfired. Thus far it is estimated

Read More »

Morrisons supermarket data breach

Just hours ago, it was made public that Morrisons, a super market, is being held liable for the breach of information involving their workers. Workers of Morrisons recently made a claim against the company after another employee named Andrew Skelton, stole data from the company that includes working salary, bank details, names and addresses of

Read More »

Reddit user discloses some major issues with Mac OS root login

Recently, a user on Reddit gave information on a huge Mac OS High Sierra vulnerability. Access to “root” permissions is as easy as an empty password, potentially leaving users extremely vulnerable. If someone has physical access to a Mac OS High Sierra system, they can access personal files and change anything without any admin credentials.

Read More »

Imgur suffers a data breach, millions of accounts compromised

Recently reported, Imgur,  the image-sharing website has been victim to a data breach. Millions of accounts are suspected to have been compromised. A security researcher recently discovered back in 2014 Imgur had suffered a massive data breach, putting millions of accounts in a state of vulnerability. The affected information consisted of emails and passwords for

Read More »

Data breach at the Department of Social Services

This just in, the department of Social Services credit card system has been breached, as of yesterday. This isn’t something to be thankful for that’s for sure. 8,500 people have received warnings that their personal data held by a contractor has been breached. Past and current employees alike are vulnerable. The breach included employee names,

Read More »

Uber made a Uber mistake

Recently disclosed by Uber was a mishap that affects millions of customers and drivers, but it was swept under the rug, potentially putting millions at a higher risk. Apparently late 2016, Uber had been hacked, and millions of customers and drivers’ sensitive information had become known to the malicious online hackers. Instead of disclosing this

Read More »

One Plus, potential for additional disasters

Recently, OnePlus, the phone brand, has been under scrutiny due to a newly discovered security flaw with one of their apps. Their app, also known as OnePlus, leaves the consumer open to attacks because the application was revealed to carry root access for the device. So what does this mean? It means that your device

Read More »

Phishing or data breaches? Which should you be worried about?

As of late, there has been a lot of talk about data breaches and online security failures. Naturally these instances can be concerning due to their involvement with their customers, like you! It is important to secure your network and be aware of any gaps that may be taken advantage of, however it is also

Read More »

IBM is diving into quantum computing

Since last year, IBM has been offering quantum computing as a cloud service. The first version released was a 5 qubit version, however today the company announced a 20 qubit version. In just 18 months IBM achieved such a large leap, this may spell a unique direction for the future of technology. IBM’s next prototype

Read More »

Android security update! KRACK be gone and band-aid adhesion!

Android deployed its recent patch for their phones. This patch holds significant updates, that involve KRACK (Key Reinstallation Attack) and also some fixes for the newly released Pixel 2 phones! Surprisingly, Google actually released three updates for November. There is the main update that involves the normal bug fixes and performance updates. The second patch

Read More »

USB with breach measurements found in Heathrow

Recently, a USB was found discarded on the streets of London. Well that’s fine right? Nothing is abnormal about some misplaced USB’s…until this one. The USB that was found contained very high detailed information involving the Queen’s route when using the airport and the security measures taken, as well as timetables of patrols used to

Read More »

Qualcomm VS Apple

Apple is being sued by Qualcomm for a breach in software license contract. As of yesterday, it was made public that Qualcomm is suing Apple, saying Apple violated a license contract to benefit a rival chipmaker known as Intel Corp for making broadband modems. Apparently, this isn’t the first time Apple and Qualcomm have butted

Read More »

Update on the wild Bad Rabbit

Ukraine speaks out on the Bad Rabbit running rampant in Russia, stating that the hackers behind the NotPetya virus were the probable group responsible for the release of Bad Rabbit. A Ukrainian official stated that the attacks from Bad Rabbit could have been mitigated greatly had organisations followed the recommended methods of malware handling, as

Read More »

Equifax update. They knew months ahead that a breach was possible

Unfortunately there are some in this world who choose to close their eyes to the issues. Equifax seems to be the type to commit such ignorant acts. Reportedly, six months ago Equifax was warned about the possibility of a security breach in their network. An anonymous security researcher had informed Equifax that they were susceptible

Read More »

Ransomeware inbound! Another threat is looming on the web

This year alone, there has already been three large outbreaks involving online security and breaches. Recently a new ransomware campaign has begun, and the targets have been high profile, for example Russia and Eastern Europe. This new threat has been named Bad Rabbit. The appearance of Bad Rabbit had been a grand event, simultaneously hitting

Read More »

Through the veil of technology, Amazon wants to deliver into your home

Recently made public, Amazon, the online consumer shopping cart giant, wants to enhance their delivery functionality by allowing the delivery driver to enter your home and drop of your package if your not around. You read that right. Amazon is going to incorporate an option for Prime members that involves the installation of a device

Read More »

OnePlus Update

OnePlus has been under some heat lately for their non-consensual data snooping through their mobile devices. After a security researcher had exposed OnePlus for their snooping, they have reportedly admitted to the non-consensual action. Their address to their customer service forum on Friday the 13th confirmed such accusations. OnePlus tried to clarify and explain that

Read More »

OnePlus is getting more than one.

The Chinese smartphone manufacturer OnePlus has been caught sneakily collecting tons and tons amount of data from its smartphones and the users. The data that’s being collected from the smartphones have been getting transferred to a server along with the serial number of the device. According to a security researcher, OnePlus devices running the OxygenOS

Read More »

WPA2 protocol leaves all access points vulnerable! Including yours!

Recently, some online researchers have discovered a fatal flaw in the WPA2 protocol. This flaw can affect anyone and everyone that is involved with Wi-Fi access. This flaw allows potential attackers to manipulate vulnerable information such as passwords, e-mails, and other encrypted data, whilst intercepting that information they may also leave ransomware or other malicious

Read More »

TransUnion, rival of Equifax having the same breach issues!

Apparently Equifax isn’t the only one having issues with the security of their website.  TransUnion’s website has been leading unsuspecting costumers to a false Flash update as well. A researcher from AV provider Malwarebytes has stated that transunioncentroamerica.com is sending visitors to fraudulent update pages and other forms of malicious sites. Just like Equifax, TransUnion

Read More »

Equifax leads to disaster once again

Equifax, which recently had a security breach now has another. In May, Equifax lost customer’s SSN, names and loads of other personal information to a security breach. Getting much scrutiny, they worked on getting the issue under control and had stated that it was solved. However it appears they were wrong. A malware researcher ran

Read More »

T-mobile the next big company to have leaked customer information!

Recently reported by a security researcher, a T-mobile bug on their website exposed its customers personal information. Due to a major flaw on T-mobiles website, hackers apparently had an easy access option to millions of customers’ personal information with only their phone number. Supposedly the bug was fixed on Friday once the security researcher brought

Read More »

Disqus breach. Hackers: 10 low security standards: 0

Here we are again folks, another article of a large breach in security, leaving multiple thousands in a state of possible vulnerability. It was discovered that back in 2012, the same year Engadget used Disqus for comments,  hackers had claimed data from Disqus’ servers. A snapshot of usernames and the emails associated, dating back to

Read More »

Whole Foods credit card breach

Recently discovered by the Whole Foods company was the possibility that nine of its Bay Area locations had their credit card information exposed to hackers. Customers who bought groceries at 56 stores through the country were unaffected by the breach.  However those who frequent the in-store table-service restaurants and taprooms at those locations may have

Read More »

Google’s Pixel 2 smartphone!

Recently announced was Google’s Pixel 2 smartphone. Now i know, its just another phone, and this is an I.T. businesses article, so how does this relate? Well that’s where the fun is! The Pixel 2 has a strong feature with it’s hardware that really might become a big game changer! Pixel 2’s AI technology is

Read More »

Yahoos 2013 hack affected everyone!

Yahoo’s most known and infamous hack in history, is worse than initially thought. According to Verizon, who acquired yahoo in June, its now known that all 3 billion users were affected at the time of the hack. No one got away. This is a huge upset in comparison to the initial damage report of 1

Read More »

What is Cloud technololgy?

Most often, when someone mentions the ‘cloud’, there is often someone who is too embarrassed to ask ‘what’ the cloud is. Cloud technology has taken the world by storm (no pun intended) in most all areas these days, the cloud is involved in the information storage/management. Businesses to college campus’ to home networks. So what

Read More »

Google acquires cloud identity company Bitium

Google cloud has recently acquired the company known as “Bitium”, a company which gives a focus on enterprise grade identity management and access tools. These tools can be used for single-sign on, for applications based on the cloud. This newly acquired company will help Google better manage enterprise cloud customer implementation across and organization. This

Read More »

Ultrafast 5G broadband on the horizon!

Just recently, researchers at IMDEA Networks in collaboration with 18 partner organizations, have developed a new technology for mobile radio access that goes with mm-wave (Millimeter-wave) frequencies. This is a highly promising solution for efficient, high capacity data delivery. This new system exploits frequencies above 10 GHz. Forms of communication at this level pose new

Read More »

CCleaner update, technology companies watchout!

A follow up to the recent article about the hacking of the popular CCleaner software, it seems there was more damage than initially believed. According to Cisco systems, after research was conducted, it became apparent that the breach was far more serious than initially described by Periform. Despite more than 2 million people being affected,

Read More »

Gas skimmers! Be careful at the pump!

Breaches in security through credit cards are becoming something of a more relevant issue with each passing day. Credit skimmers have been found more and more at gas pumps among other locations, swiping your credit card information, allowing the owner of the skimmers to gain access to your funds if your unaware. Main reasons skimmers

Read More »

CCleaner software infected by nasty malware!

CCleaner is a free optimization tool for windows PC and Android mobile. This morning Piriform, the company which makes the CCleaner tool, divulged that specific versions of the software had been piggybacked by hackers. Affected versions include CCleaner 5.33.6162 and CCleaner cloud 1.07.3191. The malware has a malicious data-harvesting software, compromising sensitive data of those

Read More »

Massive malware outbreak on Androids google play store!

Recent security checks have discovered that a nasty malware has found its way to peoples devices via the google play store. Reportedly dozens of malicious apps has affected as many as 21 million victims through fraudulent premium texts messages and fake services. An Israeli cybersecurity giant published the reported attacks. Supposedly, this malware directly harms

Read More »

Hackers-2, Equifax-0

After the recent announcement that Equifax had been the victim of a hacking, there has been scrutiny towards the company. Millions of people had their SSN breached and other personal information stolen. From an on looking perspective it seemed like things couldn’t get worse for Equifax, but it seems that was wrong. Once again Equifax

Read More »

Hyper-V! What is it, and do you need it?

Hyper-V, also known as hypervisor, is a form of virtualization technology. Hyper-V is a computer software, firmware or hardware that creates and runs virtual machines. A computer that has Hyper-V is a host computer, and can allow guest operating systems access to virtual operating platforms. Hyper-V allows physical to virtual migrations, private clouds, public clouds,

Read More »

If you use google drive/photos, be ready to switch your files around!

Recently announced by google, their application used by many for businesses and private use, Google Drive and Google Photos, will be shut out. Google Drive/Photos is being replaced with a new application called Google Backup and Sync. This new application is essentially the same as Google Drive/Photos, however it consolidates the applications into one single

Read More »

Equifax hack leaves 143 million with roaming SSN

Mid May to July of 2017, Equifax had a security breach of their consumers private personal information, including social security numbers, birth dates, addresses and some drivers license numbers. Adding to the issue, it has been noted that around 209,000 credit card numbers of consumers were breached as well. If you have had any interaction

Read More »

Switch Port Protection

There are multiple ways to secure your network, but one of the easiest is with a secured access switchport. What is a switchport? A switchport, or network switch, is a networking device that allows the connection of devices to computer networks. This is accomplished through packet switching that grants the ability to receive, process, and

Read More »

What is DNS hacking?

Hacking comes in a variety of forms, and most are accomplished through connecting to your network directly in some way. However DNS hacking is a form of hijacking that is indirect but can have huge direct consequences. DNS stands for Domain Name System. The DNS is your known name, this is something that would show

Read More »

Network Segmentation Security

As we all know, cyber attacks are becoming more and more commonly talked about. Defending yourself against a cyber attack can be difficult, there are so many forms of cyber attacks and multiple ways you can try to anticipate them. However, network segmentation is effective for anyone and everyone in helping to slow down the

Read More »

Layered email security

We all have loads of emails coming in on a daily, especially if your a business. However we all also receive a bunch of spam, and some that have very bad intent for your security! Phishing attacks are becoming some of the most prominent forms of security breaches. Phishing attacks: Phishing is the attempt to

Read More »

Can you hear me? Of course you can, your using VoIP!

VoIP stands for Voice over Internet Protocol, and its pretty cool! VoIP is an alternate way of making phone calls. For VoIP you don’t even need a telephone to use its services! An internet connection and computer is all you’ll need! VoIP is generally used for businesses as a convenient alternative to help enhance functionality

Read More »

Firmware updates aren’t always the best

We at Re2tech make sure to keep our eyes on the radar for any possible security or reliability issues that can arise with technology on a daily basis that may affect you and your business. Recently we had a ping that was unexpected. August 8th was the release of a bunk over-the-air firmware update for

Read More »

Man-In-The-Middle-Attacks, dont get caught in the middle!

the Man in the Middle (MitM), is a form of cyber attack that abuses public WiFi access to hack into peoples information that may pertain to messages to transactions, and even saved passwords. How it works- Clients (which is you) use an access point in a public location, simply put, public wifi, for example caribou.

Read More »

Security and how cyber attacks are evolving!

Cyber attacks are a race against time, every nanosecond an attacker is undetected more systems and vital information can be breached. Sensitive data needs to be protected with utmost seriousness, for it could lead to a string of problems were it to be harnessed from an outside source. Cyber attacks have been evolving at a

Read More »

Have you been pwned?

Following up with our last post on what API V2 is, now we are going to address how API’s can be used against us rather than for, and why you need to stay on top of your security measures! API has been designed for easy use with no authentication and nothing to get in its

Read More »

Microsoft Welcomes Unbuntu To The Microsoft Store

This week Microsoft announced the availability of Ubuntu Linux distro as a free download in the Windows Store. Microsoft Senior Program Manager, Rich Turner, says that it can be installed on any Windows Insider build.   There are some advantages to using the Windows Store version of the Ubuntu: Due to the use of a

Read More »

IBM Unveils New Technology!

IBM unveils new encryption technology to fight back against data breaches. IBM has rolled out its newest mainframe. They call it IBM Z. The new data encryption system aims to bring major advances in cryptography technology to safeguard the worlds healthcare, government, banking, and retail systems. They built this in hopes of addressing the global

Read More »

The US is close to separating military-focused Cyber Command from the NSA

The United States after long debate is reportedly moving forward with plants to separate its military focused Cyber Command branch from the National Security Agency. According to the Associated Press, the changes should come within the coming weeks. Cyber Command has been under the same command as the NSA since 2009. But these two operate

Read More »

A Company in Oregon could be revolutionizing how we farm

An Oregon startup called DroneSeed is trying to change how we farm. Not only that but could also help with the replanting trees. If the startup gets its way, foresters in the Pacific Northwest might be in for a surprise the next time they are out in the field. Instead of walking into a team of

Read More »

Hacker steals $7 million in Ethereum from CoinDash!

Hacker diverts websites wallet address to his own and racks in over $7 million worth of Ethereum.   CoinDash is a social trading platform for crypto-markets. The hack took place on Monday, just a few minutes after CoinDash launched its ICO(initial coin offering) in an attempt to raise funds in the form of Ethereum crypto-currency.

Read More »

New Malware Caught Infecting Android Devices!!

A new uncovered malware strain has already infected more than 14 million Android devices around the world. The operators have earned approximately $1.5 million in fake ad revenues in just two months. Dubbed CopyCat, this malware has the power to root infected devices, establish persistency, and infect malicious code into Zygote. Zygote is a daemon

Read More »

Adwind – Cross Platform Malware Returns

Hackers and cyber criminals are becoming dramatically more adept, innovative, and stealthy with each passing day. Cybercriminals have shifted from traditional methods to more clandestine techniques that come with limitless attack vectors, low detection rates, and support for cross platforms. Cyber Security researchers have found that the infamous Adwind, a popular cross-platform remote access trojan

Read More »

Internet crime on the rise

Internet crime continues to be a problem In 2016 the financial loss from cybercrime in the U.S. exceeded the $1.3 billion mark. According to a report by the Federal Bureau of Investigation’s Internet Crime Complaint Center, this is a rise of 24 percent. The 2016 internet crime report examined the most prevalent and damaging forms

Read More »

Windows Server 2016: Why it could be great for your business!

Thanks to cloud technology, the rate of change is faster than ever before, putting more pressure on IT. Organizations demand increased security, efficiency, and innovation, and Windows Server 2016 delivers. Windows Server 2016 is the cloud ready operating system that supports your current workloads while introducing new technologies that make it easy to transition to

Read More »

A wider laptop ban could threaten your safety and data

For the past few days, frequent travelers have been dreading some bad news other then just being stuck in the middle seat: having to check their laptops before flying home from Europe. That’s the fear invoked by reports that the Department of Homeland Security will expand it’s current ban on large electronic devices in the

Read More »

IoT devices: Be Productive and Innovative!

Internet of things More and more people are using Internet of things devices to help them with their work and every day life. Tablets are becoming more and more popular in the business world. You can access practically any app that you would access on your PC but at your finger tips. With the perfect

Read More »

Ransomware update: Petya

Petya-based ransomware using EternalBlue to infect computers around the world There are more reports of a massive cyber attack hitting a number of companies in Ukraine, including banks, transportation services, energy companies, and even the government. Avast says this is another example of the Petya-based ransomware, which was first identified in 2016. Petya ransomware was

Read More »

New Bill Would Bar Pentagon From Business With Russian Cyber Firm Kaspersky

A provision in a Senate spending bill that is likely to become a law would stop the Defense Department from doing any business with Kaspersky Lab. Which is a Russian cyber-security company whose employees were interviewed at their homes this week by FBI agents. This congressional action comes from mounting concerns about the Moscow-based company,

Read More »

Massive cyberattack hits Europe with widespread ransom demands

Ransomware strikes again! Another wave of powerful cyberattacks hit Europe and beyond last Tuesday in a possible reprise of the widespread ransom assault in May. A Russian oil giant, a Danish shipping and energy conglomerate, and Ukrainian government ministries were part of those affected. Even the site of the Chernobyl nuclear power plant was affected

Read More »

Your Home Router is not Safe!

I have been talking with clients for years on this.  Home routers or even routers you get from your internet providers are not safe.  The reasoning is this, the CIA hacks your router so it can ease drop on your digital conversations.  Most people say that they do not have anything  to hide, but that

Read More »

Businesses beware of IOT devices

IOT devices pose a serious security risk! These devices are products, other then computers, that connect to the internet. In this day in age it could almost be anything. For example IOT devices could be a fridge, or a Smart TV, or even some children’s toys! While Internet of Things devices may lead to more

Read More »

July 12th: Internet wide day to save Net-Neutrality

Net Neutrality The FCC wants to destroy net neutrality and give large cable companies control over what we see and do on the internet. If they happen to get their way, they will allow widespread blocking, throttling, extra fees and censorship. On July 12th, the internet will come together to put a stop to this!

Read More »

US says North Korea is behind cyberattacks dating back to 2009

The FBI and DHS are pinning several high-profile hacks on a group called Hidden Cobra, formally known as the Lazarus Group. On Tuesday, the US Department of Homeland Security and the FBI issued a joint statement saying that the people behind the attacks are “cyber actors of the North Korean Government” who target computers running

Read More »

Microsoft buys Hexadite

Microsoft Buys Hexadite to Toughen Windows Security On Thursday, June 8th, Microsoft said it has agreed to buy Hexadite. Which is a company that incorporates artificial intelligence in it’s responses to cyberthreats. According to earlier published reports, Microsoft was in talks to buy the firm for $100 million! However the terms of the official agreement

Read More »

Microsoft warns of devastating cyberattacks

Microsoft prepares for the worst! Last month’s WannaCry ransomeware outbreak seemed to be just a warning shot for what is to come. On June 13th, Microsoft released critical security updates to block another wave of attacks. The patches are even available for unsupported systems like Windows XP and Server 2003. If you are unfamiliar with

Read More »

Amplifi – WiFi like you’ve never had before

Drastically improve your WiFi network in your home! Amplifi by Ubiquiti Networks is a new product that can help improve your in home WiFi network. Amplifi is much different then your average router. Depending on the size, layout and age of your home, WiFi signals might have trouble reaching every corner in your home. With Amplifi

Read More »

62 Minnesota Chipotles hit by Malware

A little over a month ago, Chipotle was hit by a malware attack that stretched across all stores in the United States. They have just released more information on the attack. In a long release statement, Chipotle says an investigation showed that malware designed to credit card data was used on over 2,249 restaurants across

Read More »

Your apps might be tracking you using ultrasonic frequencies

There is a chance your phone has been tossing out ultrasonic tones to be picked up by other devices. Sounds that the human ear cannot pick up but devices can. The German government hired a research team and they discovered that more than 230 apps on the Androids market hosted by Google, were secretly tracking

Read More »

Cybersecurity extremely lax at Mar-a-lago

Propublica and Gizmodo reported that based on their most recent investigation the private club President Trump owns has extremely lax cybersecurity. He calls it the southern white house. Trump has used the resort to meet with staff and foreign heads of state on official buisness. In February, Trump took a call about a ballistic missile launch

Read More »

Big business fights back !

Big Businesses are fighting for your privacy!   Google is currently waging a quiet war against the United States Government. The FBI is tasking out warrants demanding that Google hands over information from Gmail data that is stored overseas. And google stores customer accounts in servers around the globe, so this is a fight that

Read More »

Watch out for Ransomware!

WannaCry 2.0 is a new form of ransomware that is affecting Windows computers around the world. Ransomware is a type of malware that encrypts all your data on your PC, and the only way to unlock it is to completely erase your hard drive or pay a ransom to the hacker. If you have a

Read More »

You may not be as secure online as you think you are

Today, you might think you’re secure online, but the chances of that being true are very slim. The problem with what we know about cyber-security is not that we remain illiterate on the topic, it is that we assume we know what we are doing. The Pew Research Center located in Washington D.C. did some research

Read More »

HP’s Bad Driver is Key Logging your data!

An update from a security blogger ModZero has found that a HP Driver for audio has been unintentionally logging all your pressed keys and storing them locally on your pc. The files are located on your HP computer in a easily accessible folder on your pc. If you have an HP laptop and are using

Read More »
Banner@re2tech

New Signs at our Office! Free Beer -See inside for Details

FREE BEER Just Added some new Signage to our Space in Jordan!  If you are coming down to the Cinco De Mayo Block Party in Jordan tonight you can check them out.  We are right next to Roets Brewery on Water and Hwy 21 downtown Jordan.  Also if you see Rick downtown say you saw

Read More »

Malicious Google Apps Phishing Scheme

If someone invites you to edit a document in Google doc’s today, don’t open it — it can be spam from a phishing scheme that’s been spreading quick this afternoon. As precise on Reddit, the attack sends targets an emailed invitation from someone they’ll realize, takes them to a actual Google sign-in display screen, then

Read More »

Intel patches security flaw that has gone unnoticed for 7 years!

For the last seven years, a large amount of Intel workstation and server chips have contained a security flaw that could be used to remotely control and infect systems with spyware. The flaw is in Intel’s Active Management Technology(AMT), Standard Manageability(ISM) and Small Buisness Technology(SBT) firmware versions 6 to 11.6. The security hole allows an

Read More »

Why do companies need us!

IT Support   Why do you buy insurance?   The reason is risk management! Risk management and thought process is a core function at RE2TECH.  We do not want you wondering why your backup failed or your system is not working and now you have your entire company sitting idle while you are not able to

Read More »

Data storage on an atomic scale

Someday we may not need to worry about the amount of data storage we have. Dutch scientists, at the technical university of Delft, have come up with a means of storing data on an atomic scale. With this new innovation, each atom represents a bit. The Dutch scientists have made 1 kilobyte of data storage

Read More »

Wi-fi will use 10,000 times less power in the future

A new form of Wi-Fi will be taking the place of current means of making Wi-Fi happen. Currently all forms of Wi-Fi devices have both a digital baseband and an analog RF. You might be asking yourself why would we still use analog technology. While we currently still need to use an analog RF to

Read More »