As perhaps the most widely-used computing tool in the workplace, Windows remains a huge target for hackers of all kinds. Criminals are always trying to uncover vulnerabilities in the operating system, but this time around, Microsoft has truly outdone themselves. Windows 10’s built-in security, according to hackers at the Black Hat conference in Las Vegas, allows for the most secure Windows operating system in several years.
Microsoft's latest round of security patches resolved 27 vulnerabilities affecting Windows, Microsoft Office, Internet Explorer, the Edge browser, and other software. It’s important to patch these vulnerabilities as soon as possible. If, on the other hand, you’ve already applied the latest security patches, you have little to fear.
The Petya ransomware, a particularly vicious threat, has reared its ugly head once again; only this time, it’s not alone. Petya now comes bundled together with Mischa, another ransomware that works well alongside Petya. The ransomware is delivered via an inconspicuous email disguised as a job application, with a resume attached. Once the user downloads the file, Petya encrypts the files on the device.
Augmented reality is a growing trend in the technology industry. Perhaps one of the best known today can be found in the extremely popular mobile device app, Pokemon Go. However, hackers have seized the opportunity to infect players who want to “catch ‘em all” with a backdoor called DroidJack - something that certainly won’t help gamers “be the very best.”
Getting hacked is a scary occurrence. It’s a major reason why you have security measures put into place. You try to avoid it as much as you can, but getting outsmarted by hackers happens to the best of us. The good news is that as long as you approach your hacking incident in a reasonable way, you can limit the amount of damage that’s done to your infrastructure.
No security solution is perfect. Each one has its own set of pros and cons. For example, relying completely on an automated solution is thorough, but it will flag plenty of threats that aren’t really threats (aka, false positives). Meanwhile, a human overseeing security is great for spotting worrisome trends, but a human can’t possibly catch every single attack. With this dynamic in mind, a team of researchers from MIT has successfully blended the two.
It’s important that your business uses the most recent version of any operating systems and software solutions used by your workforce, but Internet Explorer “fans” have had a rough start to 2016. Nearly a quarter of all Windows PCs are still using unsupported versions of Internet Explorer, half of which are still running Windows XP.
Most companies have to have a workforce, generally one of considerable size. Unfortunately, the more users you have, the more potential risks you run into. Of course, your workforce doesn’t collectively intend to be a security risk, but the digital world is a complicated place, with threats around every corner and malicious programs just waiting for your employed end-users to slip up. Here are ten such honest slip-ups to watch out for:
Hackers have always gone after industries that are profitable, or hold sensitive information that can be lucrative when sold under the table. As such, retailers that accumulate financial credentials are often hit by hacks. The entertainment industry is no different, and hackers continue to grow craftier in their pursuit of wealth and power. Not even Steam, the PC gamer’s most valuable software solution, is safe from the dangers of hacking attacks.
Which database management system is running on your company’s server units? For end users, it’s not something that they put a whole lot of thought into. However, if you completely overlook your Microsoft SQL Server, you may end up running an expired version that puts your data at risk. Case in point, SQL Server 2005, which Microsoft recently ended support for.
Hackers have proven that they will do whatever it takes to get to your valuable assets, even if it means taking advantage of physical objects that work alongside a specific frequency. As it turns out, this is exactly how hacking a garage door works, and all it takes is a decade-old communications device to capture the frequency and unlock any garage door that utilizes it.
Businesses all over the world are starting to implement two-factor authentication. That's because the value of passwords is expected to depreciate as hackers find ways to punch holes in even the most comprehensive security solution. In response, users are being forced to find other means to increase their security.
We talk about a lot of frightening technology scenarios for businesses: data loss, identity theft, and expensive hardware failures that can inflict substantial downtime and, therefore, cripple the ability of your business to sustain operations. One industry that has changed the way they manage risk, specifically the potential failure of important security systems, is the nuclear power industry. Any business can learn how to mitigate disaster by looking into the specifics of the two most horrendous nuclear meltdowns in history: the meltdown at Chernobyl in 1986, and the tsunami-induced disaster at Fukushima in 2011.