As you may very well be aware, the Ashley Madison debacle revealing account emails of users has also divulged their passwords. A total of 11,716,208 silly, yet remarkably weak passwords were discovered. Passwords such as “password,” “123456,” and “IThinkILoveMyWife?” are a few of the many that were used. These revelations only reinforce the importance of stronger passwords to keep your information secure. Never use weak passwords, and never underestimate hackers as I’m sure they continue to crack easy passwords like this time and time again. If you do happen to find yourself in a situation where you would use a site such as Ashely Madison create a completely randomized password yourself or use a password manager.
Malware is continuing to wreak havoc on devices, notably Android. So what is Microsoft doing to combat such intrusions? Prevention and understanding are key. The definition of malware has extended from the more traditional viruses to the embodiment of varied attack levels including the new, more malicious threats. The Director of the Microsoft Malware Protection Center, Dennis Batchelder, says that crime syndicates, malware supply chain, antimalware vendors, and the antimalware ecosystem are the main participants involved. Microsoft’s Digital Crimes Unit and antimalware security software’s purpose is to proactively intercept new strains of malware. They aim to block malware, stop it in its tracks when first discovered, and seek to prosecute those involved.
From a business owners perspective there are a couple things you can do to protect yourself. A layered approach to cybersecurity is important. Protecting your business from various angles and the level at which you invest into an IT Staff make a big difference in your defense. Security begins from where and how users interact with the data, to how you transmit data past firewalls, and the level of end-to-end encryption that is put in place. Data at rest must be encrypted to protect against high valued attacks on your servers, and you can complement that with the use of intrusion detection measures and data leakage monitors. The decision must be made on what the price of security is for you, depending on the value of which you want protected and what you are willing to spend for it. For big businesses, handling it in-house may seem more appropriate. However, for small businesses a manageable and more cost effective option would reasonably be hiring a managed service provider (MSP) to tend to security needs.
As the world continues to exponentially develop through the rapid advancements of technology, experts have observed that innovation and high tech evolution is not without some costs. Malware, a term used to describe a variety of malicious and intrusive software, has consequently become a newer and bigger threat, as they are increasingly more creative and complex than ever before. Research has shown that desktops are no longer the only domains at risk, but mobile phones as well.
Phishing applications pose as ostensibly harmless entities in popular Android games, often masquerading as a cheat or modification only to steal sensitive information such as your passwords, usernames, and even credit card details.
An even more disturbing malware, the so-called “crypto-ransomware” is a hostile code that holds your phone hostage, locks the screen, encrypts your data, and impels a blackmail payment of up to $500 to undo. Simplock, a type of crypto-ransomware worms its entry into an Android devices’ administrator rights, spreading its encryption to not only your documents and multimedia, but archived files as well.
Most targeted devices of advanced attacks such as ransomware reside in the developed world, whereas the underdeveloped countries are subject to the older, well-known malware. Statistics have shown that 77 percent of Androids affected with this sort of malware are in the United States.
The 6th Generation Intel Core Processor Family has been unveiled by Intel. It is built on their new Skylake microarchitecture on the company’s 14 nm manufacturing process technology. Together with the use of the Intel 100 Series and Intel CM 236 chip sets, the new processors promise an enhancement in performance with graphics, power efficiency, and support for a range of device designs including the compute stick, two-in-ones and All-in-One desktops, and new mobile workstations. The company boasts that these are Intel’s best processors ever, with powerful possibilities and built-in security. The Intel Core M processor family will include the Intel Core levels m3, m5, and m7 processors.
This generation of processors also contains a mobile “K” SKU, allowing overclocking when unlocked. Allowing more user control, the advanced quad-core Intel Core i5 processor delivers up to 60 percent improved multitasking and the Intel Xeon E3 now powers mobile workstations.
Visually, the processors integrate the new Intel 500 Series graphics, which incorporate Intel HD graphics, Intel Iris graphics, and Intel Iris Pro graphics. Additional fundamental features include adaptive performance, modern standby, and key feature integration such as an image signal processor and eMMC memory card interface. Furthermore, support for DirectX 12 is available, as well as Intel Speed Shift Technology, and Thunderbolt 3 with USB-C.
The new 6th Gen Intel Core-based processors promise to deliver the most significant advancements in computing ever seen. Now, more than ever, these systems are more responsive with enhanced performance, battery life, and security. These new advances by Intel allow for contemporary and advanced new PC experiences such as logging into your computer with your face and even having a digital personal assistant responding to your voice.
As some know this already, Microsoft is getting ready to release Windows 10 on July 29th which includes a brand new operating system that of course comes with a brand new desktop wallpaper image. Of course Microsoft wasn’t going to settle for no basic Windows logo.
Microsoft created a team of artists to create this new special logo. They used lasers and light to create this new desktop wallpaper.
Graphics designer Bradley G Munkowitz and the team built two installations in the photography studio in San Francisco to create the light coming from the windows.
Munkowitz said “It’s very exciting to be an artist in these times where your medium is constantly changing.” “I love the idea of delivering one prefect, pristine still.”
Firefox is the leader in security and privacy. It also had a major interface redesign. Along with this they have made huge strides in the memory consumption. What have won over millions of users is Firefox is the customization possibilities that you are allowed to do. With this customization tool, you are in control of the browser toolbars. Don’t forget the fast performance either that everyone loves.
Internet Explorer 11:
IE11 is now available for Windows 7 and 8, unfortunately not for Vista or XP. This latest version is faster, trimmer and far more compliant with HTML5. This is a huge improvement for Microsoft. IE includes tab-pinning and leading hardware acceleration and supports WebGL and SPDY but not WebRTC. A great privacy tool includes Do Not Track enabled by default and Tracking Protection feature.