Spectre and Meltdown belong to a category of vulnerabilities called “chip hacks.” These affect the processors of computers, phones, and tablets. Both hacks rely on the manipulation of processor operations in order to retrieve sensitive data. Spectre exploits a design flaw by tricking programs to perform unnecessary actions, potentially exposing confidential data. Meanwhile, Meltdown grabs information from the processor that ordinarily would not be accessible.
Please note that both of these hacks would require an actual malicious attempt by a hacker. Without the manipulation of the processor’s operations, private information, such as passwords, is relatively safe. However, if we’ve learned anything about security flaws, it’s that someone, somewhere, will make an attempt before a patch can be applied. The potential for your passwords to be exposed is real.
When your website is down, it’s always a surprise. What’s worse, downtime can be expensive in terms of lost productivity, lost revenue, cost to recover, and cost of reputation. Some companies measure the time lost per second when a site goes down because they have so much traffic. However, there are a few things you can do to get past the panic and into solutions to get your site back online.
While you can still use your computer with the outdated operating system, you will be susceptible to malware triggered by hackers taking advantage of weak or unpatched code.
Before the global attack was stopped, it spread around the world, affecting computers in 150 countries – including computers used in healthcare systems, utilities, and government. On Monday, May 15th, as the world went back to work, the attack picked up speed again.
Most of these scams instruct you to “like & share” a post in order to enter into a pool of possible winners. Maybe you’ve done it yourself, thinking, “what could it hurt?” Facebook giveaway scams exist for one reason: to get something from you. If you’re overly fond of your personal information (and you should be), avoid these “like & share” schemes.
An image-based backup preserves a copy of a machine’s operating system, including system state and application configurations, as well as the data associated with that machine. The information captured in this copy is saved as a single file known as an image. Each image represents a single point in time, which allows a restore of a specific file at a specific point if necessary.
Data security is becoming more important as business data is being collected everywhere. Globally, we generate 2.5 quintillion bytes of data each day, a figure that will likely grow steadily in the years to come. In fact, the data generated just within the last two years amounts to 90% of the data currently in existence. The rapid pace of data generation requires a business to stay on top of their data protection strategy. Threats to data security seem to lurk at every turn. But what are the biggest threats to a company’s data?
As part of a business continuity plan, a disaster recovery plan is critical to the health of your business. But it’s not enough to merely have a disaster recovery plan – you also need a disaster recovery checklist to make sure that plan is implemented.
Say the word “disaster” and powerful images come to mind – tornadoes, floods, hurricanes, earthquakes, and the like. But there are more common disasters. A vicious bit of malware that gains entrance into company servers. Even a cup of coffee knocked over onto a keyboard can cause significant problems. And yet, most companies are content to build their business disaster recovery plan for the “someday” of a natural disaster, which is statistically less likely to occur.
Email can be a chink in the armor of business data security.Unencrypted email can be intercepted en route between two secure points and viewed by anyone.
An iPhone Virus is a real thing If you have a smartphone, and 64% of Americans do, you have more than just a phone – you have a computer in your pocket. There have been volumes written over the years about viruses and malware that affect computers at every level, but not a lot of ink has been spilled over the subject
If you have internet service in your home – and many American households do – chances are you’re accessing it via a Wi-Fi connection. The freedom of movement that Wi-Fi provides allows us to access the internet virtually anywhere in our homes, completely cord-free, and we generally don’t give it much thought. But Wi-Fi routers can be the source of a security
We’ve written about Cryptowall ransomware before on a couple of occasions (A Ransomware Survival Story; Ransomware Recovery – Be Ready in Advance). Ransomware isn’t new, but it continues to evolve – and that isn’t a good thing. And just in case you’re still not sure what ransomware does…it’s malicious software that renders your files unusable until you pay a ransom. It does
Most of us are content to view the nightly news as something that happens to “other people,” but the recent WannaCry ransomware attack proves that none of us is safe from cybercrime. Nowadays, it’s not the “big” attacks on large companies like Target or Anthem or Sony Pictures that are the biggest threats. Sure, these things may affect important personal information, but
Back in February of 2014, we shared our survival story regarding Cryptolocker, an extremely nasty and expensive malware virus that generally spreads through email. Because Cryptolocker was recently in the news again (Warrick County Prosecutor’s Office Admits 2014 Breach), we thought it wise to continue to raise awareness so that you can take steps to protect yourself or your company from similar attacks.
iPhone users: do you want the new version of Angry Birds? Of course you do – and malware developers are banking on that. But your desire for app updates and your trusting nature might lead you to a world of trouble. What is the Masque Attack? Earlier this year, security firm FireEye discovered a significant vulnerability in Apple’s iOS that allows for malware