By: Sarah Todoroff, Content and Social Media Manager
In fictional stories the evil twin is the antagonist of the story. A physical copy of the protagonist but with a radically inverted morality. In security, an evil twin is a term for a rogue Wi-Fi access point (antagonist) that appears to be a legitimate one (protagonist) offered on the premises.
Word of the Day: Evil Twin
FREAK SSL FLAW: Who’s going to get the fix first?
A new web crypto bug, disclosed Tuesday, is affecting many Safari and Android users. So between Apple and Google, who is going to send out the bug fix first?
What is it?
The FREAK bug is the latest vulnerabilities affecting the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols used to encrypt traffic between an HTTPS website and a browser.
Common Mistakes Small and Medium Sized Businesses Make with Social Media
I have heard it said that being on social media is like being pregnant. You either are or you’re not; there isn’t an in between. Social media can be a great tool to use for your business, however if you are not careful, social media can also be harmful to you as well. It is important to be present on the social media accounts that you have.
Personal Backup: Why it is Necessary and Finding the Best Options
Why the Office 2013 suite still beats Microsoft Office alternatives
Today's organizations constantly are looking for ways to improve efficiency while keeping a lid on IT costs. But factors such as feature sets, usability, availability and effort of support can a big part in the overall cost of any enterprise productivity suite.
23 ways to improve your iPhone's battery life
Apple's latest iPhones still don't pack as much battery life as some of their nearest competitors. But by applying a few system tweaks, you can improve your iPhone's battery life considerably. Now that iOS 7 is out, there are even more ways to conserve your mobile's power.
Adobe confirms stolen passwords were encrypted, not hashed
System hit was not protected by traditional best practices, used 3DES instead. Source:www.csoonline.com/article/print/742570
November 04, 2013
Researchers have revealed, and Adobe has confirmed, that the millions passwords stolen during the breach in October were not originally stored according to industry best practices.
Next big thing: Non dedicated devices?
There are numerous tech buzzwords that surface each year, one of the more common in the past couple of years is virtualization. Being able to take physical systems and replace with a cheaper, often more efficient, virtual version, is something many businesses appreciate.
VoIP Basics for Beginners
VoIP uses the digital network to transmit phone calls, and can be a viable replacement for standard telephone services. But call quality can be a factor in one's decision to switch.
VoIP for Beginners, will help you understand the basics of VoIP, so you can decide when and how to make the switch.
2012 Cost of Cyber Crime Study
Cyber attacks generally refer to criminal activity conducted via the Internet. These attacks can include stealing an organization’s intellectual property, confiscating online bank accounts, creating and distributing viruses on other computers, posting confidential business information on the Internet and disrupting a country’s critical national infrastructure.