The company has been renamed Snap Inc. and is set to release video-recording sunglasses called Spectacles. Spectacles will contain a 115 degree-angle lens, allowing the wearer to record up to 30 seconds of video. If you are an avid Snapchat-er this will change the way you snap indefinitely. Taking the
BVA INC – IT Consulting Blog
Since 1993, BVA has delivered the highest quality in serving the IT consulting needs of small- and medium-sized businesses in Arizona and the greater Phoenix area, supporting them in maximizing the value of their information technology investments. We understand the impact that technology and computer networking services has on your business, and we are committed to your success.
Weak default usernames and passwords spawned the massive DDOS attack against internet connected cameras and DVRs. Most botnets use infected PCs to generate an attack. This botnet, Mirai, was of a different breed, specifically programmed to scan the internet searching for poorly secured products, and proceeding to try redundantly obvious
The three best practices to avoid mobile malware is to use an official app store, resist temptation to jailbreak your device, and keep updates current. Apple and Google app stores remain the most vigilant about mobile malware concerns. Google uses Verify Apps that runs in the background of modern Android
Cisco has released reports that a high priority security hole in its IOS software could have allowed hackers access to memory contents, and therefore confidential information, from more than one product in their lineup.
Cisco has pinpointed cause of the vulnerability to “insufficient condition checks in the part of the code
Not all teenagers are sneaking out in the middle of the night, one is sneaking into nearly 800,000 open FTP servers. The story begins with a security researcher, Minxomat, scanning IPv4 addresses to find nearly a million open FTP servers needing no authentication for access. This scan revealed that not only
Windows 10 offers an option to help protect third parties from tracking your movements based on your connections to Wi-Fi networks. Under Settings > Network & Internet > Wi-Fi, turn on the Use random hardware addresses setting. This will keep third parties from matching your Wi-Fi adapter’s hardware address with
Identity-Management-as-a-Service (IDaaS) provider aids with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.
Okta Identity Management
Okta comes highly rated for identity management, and for good reason.
Messaging is one technological advance that most cannot live without. But most of us would like to rest assured that what we type will be for the eyes of the receiver only, and not a mysterious third party. Regardless of paranoia or worry about hacking, encryption is a sure fire
You’ll find the new bedtime feature offered in iOS 10 in the Clock application. The first time you use the feature you will be walked through the functions. You may notice the application is now in dark mode, finally realizing most of us set alarms when we are already in
Apple has always had a productive approach to voicemail, first with the visual listing of voicemails with the contact name, date and time attached, making it easy to browse past or go directly to the voicemail you would like to hear. The upgrade to iOS 10 takes this a little further,