Archive for month: April, 2016

Storage and Backup Products that Save the Day

Nasuni Cloud Storage – Leveraging the cloud as a primary storage component, Nasumi Cloud NAS combines local storage controllers and cloud storage to provide global access to data with local performance. T...

ATM’s – The Next Target For Hackers

Use of outdated operating systems like Windows XP and lack of security means it’s still possible to crack ATM security, warn researchers. As one of the millions of people who frequent their banks ATM at l...

Ransomware Attacked My Mom’s Computer

How My Mom Got Hacked, a real life story about Brooklyn artist who receives a panicked phone call from her mom one day complaining her personal computer has been taken over by some sort of strange encryption. T...

VPN, you need one

A Virtual Private Network, or VPN, is used to connect a private network, such as a company’s internal network, using public wires. In other words you can use an other IP other than your own to appear you ...

Who’s in Charge of Your Cybersecurity?

  The first step in successful cyber-security is getting every employee on board. It is pretty obvious that some hardware goes into creating a security shield around important data. As an Information Techn...

The Rumors are True, Ubuntu Coming to Windows 10

  “The Bash shell is coming to Windows. Yes, the real Bash is coming to Windows” said Microsoft’s Kevin Gallo at the Build 2016 keynote. The partnering of Canonical and Microsoft have ma...

Windows 10 just gets better and better!

    In light of the Windows 10 Anniversary update coming this summer, Microsoft is vamping up some of their already offered features. Cortana becomes a stronger force, Windows Hello is improved and ga...

The Newest Security Trend – Rewarding Hackers

There is always that one superhero willing to play nice with the villain. In the world of tech hackers, HackerOne is that superhero. HackerOne acknowledges that modern security is hacker-powered. They have crea...

U.S. unlocks iPhone in San Bernardino Case, without Apple’s Help

According to the New York Times, law enforcement has figured out a way to sidestep the encryption on the iPhone in the San Bernardino case, and they did it without the help of Apple. The U.S. Department of Just...