Posts

Showing posts from 2018

How To Protect Your Data From Ransomware

Unless you avoided reading or listening to the news last year (and with everything going on in the world who can blame you), you no doubt heard reports of ransomware attack after ransomware attack occurring in 2017. This type of hacking issue, where cybercriminals break into individual or company systems and hold data for ransom, is rife right now, and according to one report, actually increased almost ten-fold last year. As such, no matter which industry you work in, and whether you’re an entrepreneur, freelancer, contractor, or employee, it’s imperative to keep all your important information safe from prying eyes, and from downtimes as a result of it being held captive. Read on for some steps you can take to avoid a ransomware attack this coming year. Install Security Software and Firewalls First off, one of the simplest things you can do to protect your data is to install top-quality security software on all the devices you use. There are many different products on the market

How Office 365 Data Can Be Protected From Ransomware

How to protect Office 365 data from ransomware attacks Given the broad scope of services Microsoft Office 365 provides, it's no surprise it has become one of the company's fastest growing revenue streams. Widespread popularity often breeds malicious activity, however, and Office 365 is no exception. Ransomware is growing at a mind boggling rate - Cisco estimated a 350% year over year growth rate in their 2018 Annual Cybersecurity Report. Ransomware, in particular, has introduced significant risks for Office 365 users. Cerber ransomware, for example, targeted Office 365 and flooded end users' inboxes with an Office document that invoked malware via macros, and the now infamous WannaCry attack was engineered to take advantage of a Microsoft vulnerability. And now we have an even more insidious ransomware strain with ShurL0ckr - designed to evade the built in malware protection on OneDrive and Google Drive. Ransomware can be truly debilitating as it expands very quickl

Check Out The Top 20 Least Corrupt Nations In The World

These are the 20 least corrupt countries on earth Transparency International on Wednesday published its latest Corruption Perceptions Index, a global ranking of fairness around the world. The ranking of 180 countries is based on the level of public sector corruption in 2017, according to businesspeople, journalists, and civic organisations. Higher-ranked countries tend to have more press freedom, access to information about public spending, and independent judicial systems. Countries are given a score out of 100, with those scoring highly being the least corrupt. Keep scrolling to see the list, which is ranked in ascending order. Transparency International =20. Japan — 73 =19. Ireland — 74 =18. USA— 75 =17. Belgium — 75 =16. Austria — 75 =15. Iceland — 77 =14. Hong Kong — 77 =13. Australia — 77 =12. Germany — 81 =11. UK — 82 =10 The Netherlands — 82 =9. Luxembourg — 82 =8. Canada — 82 =7. Sweden — 84 =6. Singapore — 84 =5. Switzerland — 85 =4

Russian Hacked The Olympics And Trying Pining It On North Korea

Now that the 2018 Winter Olympics are over, we're now learning who was responsible for hacking the games' systems... and the culprit won't surprise you at all. US intelligence officials speaking anonymously to the Washington Postclaimed that spies at Russia's GRU agency had compromised up to 300 Olympics-related PCs as of early February, hacked South Korean routers in January and launched new malware on February 9th, the day the Olympics began. They even tried to make it look like North Korea was responsible by using North Korean internet addresses and "other tactics," according to the American sources. It's unclear if Russia was directly responsible for the chaos during the opening ceremony, which disrupted internet and broadcast systems to the point where some guests couldn't even print their tickets. However, the new evidence suggests Russia was in a prime position for such an attack. It also has the motivation: the country hasn't been shy a

Check Out WhatsApp's New Features

WhatsApp has confirmed long-rumoured plans to roll-out its in-app payment system, allowing users to transfer money within the chat app. WhatsApp will now enable users to send money to one another inside the app WhatsApp will now enable users to send money to one another inside the app If you owe your friends money, WhatsApp has a simple new method to pay them back – without leaving your chat window. WhatsApp this week confirmed plans to bring wireless money transfers to its chat app. The rollout comes after a beta trial of the new peer-to-peer payment system was trialled on around one million WhatsApp users. The Facebook-owned messaging app will now push-out the functionality to every user in India – its biggest market, it has confirmed. WhatsApp started to launch a limited service in India, where it has currently holds more than 200 million users, last week. At present, India’s third-biggest lender ICICI Bank processes the fund transfers on WhatsApp. WhatsApp’s popular

Beware Of Cryptojackers Hacking Your Website To Mine Cryptocurrencies

Cryptojackers are hacking websites to mine cryptocurrencies CNNMoney Hackers have a new trick up their sleeves: hijacking computers to generate digital coins. As bitcoin and other cryptocurrency prices soar, "cryptojacking" attackers surreptitiously take over web browsers, phones and servers to make some serious profit. "Every avenue out there is being exploited on any kind of machine," said Jerome Segura, lead malware analyst at security firm Malwarebytes. "Consumer computers, servers, research centers - it has no bounds. We forecast it to be the biggest threat in 2018." Cryptocurrencies, like bitcoin and Monero, are created by using computing energy to solve complex math problems. When a problem is solved, a new piece of currency is made. This is called mining. Currencies can be mined legitimately, but criminals are increasingly turning to malevolent mining activities. In September 2017, Malwarebytes began tracking a major uptick in malicio

Types Of Cyberattackers And How To Avoid Them

Protecting against cyberattacks requires both high-tech and low-tech efforts by financial firms, according to presentations at the 2018 FINRA Cybersecurity conference in New York on Thursday. First advisory firms need to answer four key questions, according to retired FBI agent Jeff Lanza, who was the keynote speaker:   •  Where are your assets?   •  What at your firm is subject to attack?   •  Can you detect an attack in real time?   •  Is cybersecurity a focus for your firm at the board level? "If you can't answer all four questions you're not doing enough to fight hackers," said Lanza, a former computer systems analyst before he was recruited by the FBI. He described the key types of attacks against financial firms - bank account takeovers through malware, CEO fraud involving unauthorized wire transfers, and ransomware, which has become epidemic - and offered tips to thwart such attacks. Takeovers Through Malware Before opening any email that doe

Ways You Can Secure Your Organization From Cyberattack In 2018

2017 was a rough year for cybersecurity. Major companies like Equifax and Yahoo were in the news for massive and preventable data breaches, while high-profile ransomware like WannaCry threatened to cripple a variety of organizations, most notably in the healthcare industry. Unfortunately, 2017 is hardly an anomaly. I've seen firsthand how even the tiniest crack in a company's defenses can wreak considerable havoc. Hackers are becoming smarter: They find out what people are doing to protect against their attacks and develop ways to get around it. Still, most of the biggest data breaches could have been (and can be) prevented. Knowing what we now know about cyberattacks and given our experience in 2017, any organizational breach in 2018 could quickly become unforgivable by the public. And if companies in every industry don't start taking security seriously, this past year will be considered mild compared with what's to come - especially with hackers starting to use

Why Insuring Your Digital life Is Important

The world of interconnected devices known as the Internet of Things (IoT) is set to go mass market, with the smart devices market already worth tens of billions of Dollars annually. However, many consumers are rightfully concerned about how secure these devices actually are. “There is no bullet proof security for IoT devices,” says MyCyberCare’s Simon Campbell-Young, adding that consumers need to think of other ways to protect themselves. “Let’s face it. A connected world is simply a wider surface area that is vulnerable to attack. Hackers have already managed to breach Internet-connected camera systems, toys, Smart TVs and even baby monitors. Consumers need to think of ways to protect themselves, and to see they are covered for any damages resulting should an event occur.” According to him, traditional insurance players are growing aware of the fact that cyber risk is much more than a data breach. The IoT and other digital technologies go hand in hand with a slew of new threats t

Why Cybersecurity Training Is Important To Everyone

We live in the Internet of Everything - a world of convenience where connected devices can control our homes, our cars, medical devices and so much more. With Gartner projecting 21 billion devices connecting to the internet by 2020, the attack surface is unimaginably large, and the internet of things (IoT) is essentially a playground for cyber criminals. As we've seen time and again, hackers will exploit new and unknown vulnerabilities, and even discover old vulnerabilities hidden in IoT devices. At some point, their successful exploitations will result in a major catastrophe. Our quality of life today has become absolutely dependent on the resilience of IoT. However, we continue to find vulnerabilities in smart home IoT devices, medical devices, connected cars, printers and more. We simply cannot keep up with the expanding attack surface, which makes it impossible to identify, monitor and manage the entire breadth of these devices. At the same time, we're also facing a maj

Features To Watch Out For While Using Google Pixel 2

The Google Pixel 2, and its larger sibling, the Pixel XL 2, is one of the best phones you can purchase right now. Available through Verizon and Google, it's the latest and greatest in Android and features some pretty damn impressive hardware. It's one of our favorite devices ever, even if it's not exactly the sexiest device on the market. One of the things we love about Android is that it offers so much customization. The platform continues to get better all the time and the 8.0 Oreo release is as gorgeous as it is practical. Spend any time with the Pixel 2 or Pixel XL 2 and you'll no doubt realize there's a world of potential at your fingertips. Whether this is your first Android phone, first Google handset, or just the most recent in a long history of upgrades, you'll want to set it up to your liking. We've gathered up a handful of helpful tricks, tweaks, and tips to ensure you get the most out of the phone. Here are ten Pixel 2 settings you should kn

Top Tips To Protect Your Company From A Cyberattack

With last year reporting the highest level of cyberattacks yet, this year is a year of prevention. Companies are taking the time to understand how to keep their customer information safe from a cyberthreat and putting in place solid measures that can thwart any attack to their data. As a business owner, you need to consider the importance of protecting your customers’ confidential information to prevent it from getting into the wrong hands. To understand how your company can assess its cybersecurity and repair any potential sources of risk, entrepreneurs from YEC weighed in. Name one step business owners can take to accurately assess their company’s level of cybersecurity risk and begin to tackle it. Their best answers are below: 1. Identify basic threats. Hackers and anyone who poses a cybersecurity threat feed off a lack of information on your part. You should have a plan for basic threats like unauthorized access before you even start, and plan to keep learning about cyber

Simple Tech To Consider When Making Choice Of Things To Buy

Whether you're a tech geek or not, I doubt you have all of these on hand! Here are a few basic tech essentials you never knew you needed: Portable Power Bank We all have those times when we're unexpectedly faced with a flashing red battery symbol. Even when you put your phone in battery saver mode, it probably won't last as long as you need it to. In college, we're always on the go and may not have outlets available wherever we need them. Therefore, having a portable battery on hand to charge your phone is a huge convenience! You'll be thankful for having a power bank with you after your phone dies, especially when there's no outlet nearby.  When looking for a portable battery, ask yourself these questions:   •  How much will this battery charge?   •  Is this compact? Keyboard Skin We're college students, so a lot of the times when we eat, we eat in front of our laptops. It's just reality. So we pretty much always have crumbs on our key

How to use Chromebook in printing

While most of us are living in the cloud, there are still some things that need to be printed out on paper. Printing from a Chromebook is possible, but you will need to have the right equipment and set up. Buy a Google Cloud-compatible printer If you don't already own a printer - or you want to replace your existing model - the best thing you can do is buy a printer that works with Google Cloud Print. Google Cloud Print lets users print from a Chromebook, Windows or Mac computer using the Chrome browser, and iOS and Android devices. You'll need to tie your Gmail account to the printer before using it for the first time, but after that just keep the printer connected to a network and you can print from any of your devices. Better yet, Google Cloud printers aren't very expensive: Amazon has models as low as $38. Even if you have other laptops or desktops, you can still use these printers over Wi-Fi, Ethernet or USB. See Google Cloud printers at Amazon Convert an old

Tips on how to fix Galaxy Note 8 connection to WiFi problem (Troubleshooting Guide)

Wifi problems on Android devices are common and one of the most reported issue on the #GalaxyNote8 line is about wifi functionality totally failing to work. For this reason, we decide to write a short troubleshooting guide for you in case you'll encounter this problem in your own Note 8. This guide covers whether your Note 8:   •  fails to connect to wifi network, or   •  if it's connected to the router but internet is still not working. We hope that you'll find our suggestions helpful. How to troubleshoot Galaxy Note 8 that won't connect to wifi Being unable to connect to a wifi network can be caused by a number of factors so the steps below should assist you in determining what the problem really is. Just be sure to the things in the order we provide here so your troubleshooting will be logical. Solution #1 : Do a complete network device and phone powercycle Before you embark on doing advanced device troubleshooting, make sure that you do the b

Hackers Using Legit SSL Certificate To Hide Malware

Making sure that you are secure every time you surf the net is getting more challenging these days. No matter what type of high tech security system you may have installed, it seems hackers will inevitably find some creative way to breach it. Reportedly, hackers arenow buying SSL certificates to make their malware appear legit and, as a result, make them easier to bypass security protocols. This latest trend in cybercrime was discovered through research conducted by theRecorded Future's Insikt Group. Apparently, there is an online market where anyone, including hackers, can just buy legitimate certificates from issuing authorities. Of course, this is a jarring contrast to the common belief that SSL certificates used in illegal activities were only obtained through theft from companies and developers. According to researchers, these certificates were not stolen from their rightful owners but werepurposely created for specific buyers and registered under stolen corporate identi

Useful And Free Website Every Web Designer Should Know

Introduction I understand how web designers  undergo a hard time trying to find the best free tools, software, and web apps to use. As a matter of fact, you may be surprised to find out that you don't have any clue about most of the freebies out there. Recommended For You Are>>   •  http://downforeveryoneorjustme.com is an awesome tool to find out whether a website is down for you alone, or everyone else is experiencing the same.   •  https://namechk.com lets you type in a username and it will search for available domain names and social media platforms, to see the available results that match the username.   •  https://www.checkli.com is the best site to make free checklist for anything. The best part is that you can easily share an editable or a read-only version with your colleague to help you accomplish the given task.   •  http://draw.io is a great online tool that offers free and quick way to make site maps, diagrams, wireframes and more. It's an i

How To Deal With Cyber Attack

In combatting a targeted attack on your network, early detection and rapid response are both critical. Cyber security experts accept the strong possibility that criminals will be able to enter their network at some or other point, and in this context, the issue becomes less about being able to keep them out, and more about detecting them and taking remedial action as soon as their presence is discovered. This is according to a recent report from global cybersecurity company RSA. Anton Jacobsz, managing director at value-added distributor, Networks Unlimited, which distributes RSA products and solutions in Africa, comments, “The report from RSA Incident Response Services notes that, once detected, rapid response is needed to mitigate the potential damage and prevent them from achieving their objectives. RSA’s Advanced Cyber Defense (ACD) services for Incident Response enable organisations to prepare for security incidents without having to accept the inevitability of loss.” The

5 Apps To Create Free Wi-Fi Hotspot For Windows

Introduction If you are connected to a LAN connection on your laptop or if you are using a SIM card based internet connection, you can share it with other devices using the Wi-Fi hotspot feature available on Windows. If you are Windows 10, there is a default option to enable it and for this, you can head over to the settings panel in Windows 10. But if you are using an older version of Windows or if you want more features, there are many third-party tools available to create free Wi-Fi Hotspot for Windows. So here is the list of best 5. 1. mHotspot : mHotspot is a free tool for Windows which can share your internet connection with other devices. You can share a single internet connection (LAN, Ethernet, Data-Card, 3G/4G, Wifi) for multiple devices like Laptops, iPhones, Android phones, PDAs, iPads etc. The interface of the app is pretty simple and easy to use as well. You can connect up to 10 devices and no additional hardware is required for the functioning of this app. 2. M

What To Look Out For While Choosing A VPN Provider

Introduction Let's have a quick introduction to the term VPN. It is basically a virtual private network which enables a number of computers (a group of people) or discrete networks to get connected over a public network which is called "THE INTERNET." A virtual private network (VPN) is used by huge business enterprises when they want to connect with the remote data centers. Not only the businesses but any individual person who wishes to access any network resource while not being on the same Local area network (LAN) can use the VPNs. The VPNs are an efficient method of encrypting the conversations, data sharing, and communications if the network resources are being accessed by some unsecured public network. VPNs are most trusted when it comes to securing the computer’s internet connection. It makes sure that the entire data either being sent or received is encoded and safe from the inquisitive eyes and poky noses. Things to look for in a VPN Doesn't matt

Bitcoin Value As It Price Continue To Fluctuate

BITCOIN is the world's leading cryptocurrency and has sent shockwaves through the financial markets. Its meteoric rise in value last year has been followed by an equally dramatic plunge - but what is it worth today? What is Bitcoin worth today? Bitcoin was trading at around $10,189 (£7,432) at 11.20am on February 23 - down from earlier in the week. Trading has been extremely volatile with large swings up and down as regulators worldwide have signalled a crackdown on the "Ponzi scheme" cryptocurrency. There are hopes however as the market itself is embracing calls for regulation and this may be what is giving BTC a new hope. At the depths of its free-fall, bitcoin's value had fallen by nearly three quarters since its record high of £14,837 on December 18. A Bitcoin was worth just £4,350 on February 6 but it then recovered to nearly twice that a fortnight later. Its price was damaged by South Korea's plan to ban anonymous cryptocurrency trading, sending the market i

Tips to Make More Money with Your Blog in 2018

Blogging has become an integral part of marketing and a very infamous way of earning. Who doesn’t like sitting at home and working as and when they please? Well, as nice and cosy as it seems, you just don’t get paid for having a blog. A considerable amount of work and time is needed in order to bring your blog to a payable position. Get the entrepreneur out and let the blogger take a back seat for a while. Advertising spaces: One of the most basic approaches to making money online is advertising. The more the movement as much it attracts crowd and you are probable of getting advertising organizations. No one invests on advertising with someone with a low following. If this method works out well for you can also advertise your own products and ideas. Considering the fact that you have more options to profit, the advertising space can be put to use for self-publicity reasons too. It’s proven that marketing your own products earns a better profit than selling advertisements. If you want t

Top Blogging Sites To Host Your Blog

•WordPress •Wix •Blogger •Tumblr •Medium •Squarespace •Joomla •Ghost •Weebly\ Choosing The Best Blogging Platform – What to Look for? Before diving in the list, it helps to know what kind of platform you’re looking for. As a beginner, you’ll want a blogging platform that’s easy to set up, and doesn’t require any coding skills. You’ll also need to think about what kind of blog you want to create, now and in the future. As your blog grows, you may want to change the look of your site and add more features for your growing audience. That means it’s important to choose a blogging platform that’s flexible, with room to grow. Starting off with the wrong platform can make it very difficult to switch later on. Lastly, even if you don’t have plans to make money yet, it’s smart to make sure you have the option to do so in the future.  

Reasons Why Nokia's Pure,Secure And Up-To-Date Smartphone Should Be A Choice To Pick

Android is a name that is now synonymous with smartphones, not just in Nigeria but the world over. And this is not surprising considering the phenomenal reception of the Android Operating System over the years. According to the Worldwide Smartphone OS market share released by IDC in Q1 2017, Android enjoyed a massive 85% of the total smartphone OS market, iOS had 14.7%, with Windows left with a paltry 0.1%. Just like everyone likes to be associated with something great especially when it is continuously successful, several smartphone manufacturers now make low, mid and high-end smartphones running on the Android Operating System. However, it may interest you to know that as at today, Nokia is the only major smartphones player committing to a 100% pure approach to Android. Cool right? Yeah! Here are three reasons why you should consider one of the Nokia smartphones that run on pure, secure and up-to-date Android. As the name suggests, one thing about pure Android is that it i

Nigeria Receive New Education Package From Microsoft

Microsoft Corporation, in partnership with the Federal Ministry of Education, Abuja, has introduced an educational framework for the digital transformation of primary and secondary schools in the country. Our correspondent learnt that part of the framework is a technology solution, Microsoft 365, which can help schools to upload the scores of their pupils and make them accessible to parents. The solution, developed under the ‘Windows in the Classroom’ programme, was done in collaboration with a Nigerian firm, Sidmach Technologies. The Microsoft Education Programmes Manager, Jordan Belmonte, in an interview with our correspondent, said the package would also help schools to track their pupils’ attendance and assist parents to monitor their children’s academic performance. Belmonte said, “Microsoft 365 is able to connect all the teachers in the world. Some of the features embedded, like OneNote, aid multiple language learning. Also, it has features that are suitable for special n

How To Know A Fake Android App Even On Play Store

Fake Android apps in the Play Store are a problem. People create listings designed to look exactly like popular apps, often using the same icon and name, to trick you into downloading it, then bombarding you with ads or malware. According to How to Geek, this issue has been prominent lately. A fake version of WhatsApp was downloaded by more than one million people last year, and just this month, Reddit android community found a fake version of the popular SwiftKey keyboard and an ad-riddled version of VLC on the Play Store. The first two were removed after making headlines, and while Google finally took down the VLC after being at the top of the Android sub-reddit all day. These types of apps are not something to take lightly. Behind the scenes, they’re often doing something dangerous, like stealing all of your personal info, tracking every move you make, or even worse. •What Google is doing to combat this issue? This isn’t a new problem; it’s been happening for years and the