Date: 16 Nov 2012 | Posted BY: ulisticadmin
Open and unrestricted Internet access is one thing we consider to be a right, especially true for the younger generation who have grown up with it in their homes. Many have come to rely on the Internet both for work and day-to-day life. As such, they demand unrestricted Internet access at work, and many company bosses have obliged. Unbeknownst to them, however, there may be a risk associated with
Date: 08 Nov 2012 | Posted BY: ulisticadmin
Ahh phishing. We're not talking about the get up early, sit on a boat in the hot sun all day kind, we mean the more harmful social engineering kind. While this isn't new, it's a big issue, one many users are well aware. They dread finding themselves victims of a malicious attack on their systems. There are many ways to protect against catching something malicious, one of which is upgrading to Win
Date: 21 Sep 2012 | Posted BY: ulisticadmin
Imagine having your phone, tablet and computer wiped, followed by email accounts hacked and deleted, taking with them nearly your whole digital life. This would be a devastating loss for anyone, but it happens on a fairly regular basis. In the past few months alone, there have been two similar instances, both involving Apple, that’s making users wonder just how safe and secure Apple’s and oth
Date: 13 Sep 2012 | Posted BY: ulisticadmin
Peter Parker: a smarter than average high school student, often ostracised for being different, and more commonly known as Spider-Man. Spider-Man goes to extremes to protect his identity and if he had an email address in the modern age, he would ensure it wasn’t captured by web criminals. Do you channel Spider-Man and take the necessary steps to protect that which is important to you, namely you
Date: 22 Aug 2012 | Posted BY: ulisticadmin
One of the biggest technical issues plaguing companies around the globe is security of their systems and information. The vast majority of companies store their data on computers, with many moving some or all of it onto the cloud. When employing the cloud, companies have to trust the provider’s security, which has come under attack with increasing intensity in the past few years. In this year a
Date: 10 Aug 2012 | Posted BY: ulisticadmin
In the debate between Macs and PCs, Macs have usually won the most secure title, largely in part due to a smaller user base and a closed, tightly regulated system. As the user base and the number of cross platform programs have expanded, so too has the number of malware and security threats. If you use Macs there’s a new malware threat you should be aware of. Dubbed OSX/Crisis, this malware has
Date: 09 Aug 2012 | Posted BY: ulisticadmin
July was a bit of a rough month for many websites, with a number of popular websites suffering high profile security breaches where user information and passwords were stolen. These attacks have many wondering if their information is secure with websites. The answer isn’t a clear yes or no, and depends on a large number of factors, one of which is your password and how you keep it secure. Here
Date: 09 Aug 2012 | Posted BY: ulisticadmin
Have you ever wondered about the security of cloud based applications and services? If yes, you’re not alone. It can be a bit discerning to relinquish full control of your business and trust all your information, business processes or whole business to cloud providers. For the most part they offer a secure service, however, they have been hacked before, with the most recent service coming under
Date: 26 Jul 2012 | Posted BY: ulisticadmin
Since the Internet came to prominence, user passwords and vital information have been stolen and posted out in the open for all to see. It has come to a point where it’s an accepted risk of using the Internet, there’s a chance your information will be stolen. It seems like the number of attacks and account information being released is on the rise, and over two days in July - 12 and 13 - two w
Date: 25 Jul 2012 | Posted BY: ulisticadmin
On any given day, the vast majority of employees receive upwards of 100 emails, a varying percentage of those emails will often be notifications to social networks like Facebook, notifications many will open without looking. Hackers know this, and have started to take advantage of these notification emails to infect your system. Hackers are sending out emails that look like Facebook notifications