Your IP is:

54.82.17.138

[More Detail]


Instant Port Checker

IP:[get my ip] Port1: Port2:

Skip to content

Rumored 12.9-inch iPad could be better for business productivity

Apple is reportedly planning to launch a 12.9-inch version of the iconic iPad tablet sometime in early 2015. A larger iPad could be a more effective tool for mobile business users, but only if Apple also addresses a few other issues.

A bigger iPad makes sense on a few levels. Samsung, Apple’s chief rival in mobile devices, already offers a larger tablet. And Microsoft recently bumped its Surface Pro tablet from 9.7 inches to 12.2 inches. Smaller tablets like the iPad Mini or the Google Nexus 7 fill a need, but when it comes to real-world productivity, bigger is better.

Categories: General.

Tags: , , , , , ,

Report: Consumers concerned about online threats but do little to protect themselves

Remember banking before the Internet? You received printed bank statements in the mail and had to manually reconcile the information with the written register in your checkbook. I don’t miss it, but I also recognize the convenience of accessing my financial data through a bank website comes with some serious security considerations. According to a new consumer survey from Kaspersky Labs, I am not alone.

Categories: General.

Tags: , , , , , , , ,

Your living room is vulnerable to cyber attacks

At the Black Hat security conference in Las Vegas earlier this month, researchers demonstrated how a Nest thermostat can be hacked, to show how easily connected appliances—the household technologies that make up the Internet of Things—can be compromised. When you look beyond the demo’s hyperbolic headlines, it turns out the hack requires physical access to the Nest device, but the questions remains, “How vulnearable is IoT?”

To find out, David Jacoby, a security researcher with Kaspersky Lab, hacked his own living room. 

Categories: General.

Tags: , , , ,

Report: Android gaining on iOS in enterprise

Most businesses have embraced mobile technologies, but many are still on the low end of the mobile maturity curve. Good Technology has published its second-quarter Mobility Index Report, and it reveals some interesting trends regarding the mobile platforms and apps businesses are deploying.

Good Technology aggregated data from customers around the world and monitored app and device activations to determine overall trends, as well as which platforms and apps are most popular among Good customers. 

Categories: General.

Tags: , , ,

Attackers use domino effect to compromise your accounts

Data breach after data breach has illustrated just how weak and ineffective passwords can be for protecting accounts and sensitive information. Many sites and services have implemented secondary security protocols and two-factor authentication, but users frequently use information and email accounts that can be easily compromised—giving attackers a simple way to access your information.

Categories: General.

Tags: , , , ,

Virtual servers still face real security threats

Don’t let the word “virtual” in virtual servers fool you. You’re the only one who knows it’s virtual. From the perspective of the virtual server itself, the devices connected to it, applications running on it, end-users connecting to it, or security threats trying to compromise it, the server is very, very real. A new survey from Kaspersky Labs found that many IT professionals understand that securing virtual environments is important, but don’t fully understand the threats or how to properly defend against them.

Categories: General.

Tags: , , , , , ,

Investigation of missing IRS email holds lessons for your business

Congress has been pursuing an investigation into alleged misconduct at the IRS, and as a part of that investigation it requested emails from former IRS director Lois Lerner for the timeframe in question. The response Congress got was those emails—along with any archive or backups of those emails—have been erased and are no longer available. There are legal and compliance requirements organizations must abide by when it comes to retention of information, and the IRS apparently dropped the ball.

Categories: General.

Tags: , , , , ,

Microsoft password research has fatal flaw

I wrote yesterday about a report from Microsoft researchers, which goes against established password security best practices. The new guidance from the Microsoft researchers makes sense to me, because it fits how I handle password management already. However, at least one security expert feels that there is a fatal flaw that makes the new password advice impractical: You.

Categories: General.

Tags: , , , ,

Microsoft researchers: Use simple passwords for most of your accounts

Stop me if you’ve heard this one before: You should use unique, complex passwords for every login you have to manage, and you should employ a password management utility to keep track of it all. That is the prevailing advice, but a couple Microsoft researchers have come to the conclusion that it might be the wrong approach.

Categories: General.

Tags: , , , , ,

The game isn’t over yet for Gameover malware

In early June the U.S. Department of Justice revealed that the Gameover Zeus (GOZ) botnet had been disabled thanks to the success of a joint effort dubbed “Operation Tovar.” The celebration appears to have been premature, though, as security researchers have already discovered a resurgence of Gameover malware infections.

While the Gameover botnet has lain dormant since the takedown, a new massive spam campaign has Sophos Labs researcher James Wyke concerned the threat has returned. A blog post reveals details of why it seems to be part of the same malware family.

Categories: General.

Tags: , , , ,