• Posted on 2017/07/13 12:03

    Internet or 'Net' Neutrality, by definition, means that there are no restrictions of any kind on access to content on the Web, no restrictions on downloads or uploads, and no restrictions on communication methods (email, chat, IM, etc.) It also means that access to the internet will not be blocked, slowed down, or sped up depending on where that access is based or who owns the access point(s). In essence, the internet is open to everyone. What does an open internet mean for the average Web user? When we get on the Web, we are able to access the entire Web: that means any website, any video, any download, any email. We use the Web to communicate with others, go to school, do our jobs, and connect with people all over the world. Because of the freedom that governs the Web, this access is granted without any restrictions whatsoever. Why

  • Posted on 2017/07/11 11:00

    Spam is amazing. In an unprecedented and astonishing effort, junk email reaches almost everybody online. All it takes to get on the mailing lists used by spammers is an email address. There is no need to sign up for anything or ask for emails. The spam just starts coming, out of nowhere, apparently without any plan, and without a reason. It invades email addresses that are never used. But how do spammers discover email addresses? How do they find your mailbox when your best friend does not? Dictionary Attack Big free email providers like Windows Live Hotmail or Yahoo! Mail are a spammer's paradise, at least when it comes to finding spammable addresses. Millions of users share one common domain name, so you already know that ("hotmail.com" in the case of Hotmail). Try to sign up for a new account and you will discover that guessing an existing username is not difficult either. Most short and good names are

  • Posted on 2017/07/09 10:48

    A Guide to the iPad Recovery Mode Resetting the iPad to its factory default settings is the nuclear option when it comes to troubleshooting.  For most issues, simply rebooting the iPad will fix the problem.  It's amazing what a simple reboot will do for the iPad, although it is important to follow the right procedure when rebooting.  When that fails, choosing to erase all settings and data and start from scratch becomes an option.   But what happens when you can't even reset the iPad?   If the iPad is locked or continually gets stuck at the Apple logo, you'll need to go beyond nuclear and force the iPad into recovery mode. The iPad's recovery mode is a process that uses iTunes on your PC or Mac in order to bypass the normal operation on your iPad.  If the iPad has been disabled or something went wrong with a previous update and

  • Posted on 2017/06/10 11:11

    Check Point Threat Intelligence and research teams recently discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware,  Fireball, takes over target browsers and turns them into zombies. Fireball has two main functionalities:  the ability of running any code on victim computers–downloading any file or malware, and  hijacking and manipulating infected users’ web-traffic to generate ad-revenue. Currently, Fireball installs plug-ins and additional configurations to boost its advertisements, but just as easily it can turn into a prominent distributor for any additional malware. This operation is run by Rafotech, a large digital marketing agency based in Beijing. Rafotech uses Fireball to manipulate the victims’ browsers and turn their default search engines and home-pages into fake search engines. This redirects the queries to either yahoo.com or Google.com. The fake search engines include tracking pixels used to collect the users’ private information. Fireball has the

  • Posted on 2017/05/31 10:54

    Ransomware cyber attacks are quickly becoming the preferred method of attack by cybercriminals. WannaCry, the latest global incident, is particularly damaging because it is also a worm—not just a ransomware program. As a result, it looks for other computers to spread to. When it infects a new computer, it encrypts the data and locks out the owner until a minimum of $300 in bitcoin is paid. To achieve its unprecedented rate of circulation across networks, WannaCry ransomware utilizes a Windows OS vulnerability that was recently exposed as part of the leaked NSA hacker tools. Microsoft has released a public bulletin along with patches for Windows XP, Windows 8, and certain server platforms that did not receive the original MS17-010 update. You may view their announcement in full here. Whether you call it WannaCry, WannaCrypt, WCrypt, Wanacrypt0r, WCry, or one of the other names currently vying for the “call me this” crown, the ubiquitous