e-bay Security Practices under investigation by US States      

Biggest ever Distributed Denial of Service (DDoS) attack on Cloudfare Networks       

Bitcoin Exchanges continue to suspended withdrawal operations      

Snowden accessed NSA confidential data using web scrapping tools      

Barclays Bank probing the breach of client data sold to rogue City traders      

New Snapchat Flaw Can DoS and Spam iOS and Android       

2014 New Year Resolution: Disaster Recovery

Published on: 2/7/2014

Looking back, I can see at least three different New Year’s resolutions that I totally failed, but as CIO of a Tech Support Company, failure really isn’t an option. I am talking about backup and disaster recovery. Our failure means our client’s failure, and we won’t stand for that. In order to avoid failure in the disaster recovery area, it’s always best to plan ahead - and the beginning of a new year is one of the best times to do so. Please take a moment and think about YOUR backup and disaster plans.

Snowden accessed NSA confidential data using web scrapping tools

A senior intelligence official at NSA disclosed that Mr. Edward J. Snowden used very low cost web crawling tools to scraped data from NSA documents. Note that NSA have top grade security to protect against outside attacks and also responsible for protecting nation's sensitive military and intelligence computer systems from cyberattacks.
Read More

Possible misuse and loss of customer data at Barclays Bank

A whistleblower at Barclays bank raised the issue for possibility of data loss and subsequent misuse of approx. 27,000 files containing detailed personal data of Barclays customers and potential customers. The files may have reached in the hands of 'spank shops.'
Read More

How Ransomware turns your computer into a bitcoin miner

Linkup is the latest ransomware asking victims for a payment to undo damage to their computers. Security researchers have identified a new type of “ransomware” which blocks internet access and turns users’ computer into a bitcoin miner pending payment of a ransom. The malware, named by researchers at Emsisoft as “Trojan-Ransom.Win32.Linkup”, differs from previous examples of ransomware. “It does not directly lock your computer or encrypt files,”...
Read More

Q: What are some standard computer industry security best practices?

A: In answering this question we are extremely pleased to pass along technology and security know-how to you in this article. Here are some standard computer industry security best practices for you to consider. Install a Firewall Security Appliance. Security Appliances are special devices at the edge of your network that monitor the activity of external connections, primarily the Internet, to an internal network. Firewalls help to eliminate the...
Read More