Pagoda Blog

New Password Guidelines Call for Simple, Memorable Phrases

September 21, 2017
According to the National Institute of Standards and Technology, their official guidelines for creating secure passwords were, in a word, wrong. All those random numbers, letters, and characters are not so hard to crack after all. In an interview with The Wall Street Journal, former National Institute of Standards and Technology manager Bill Burr admitted, “Much of what I did I now regret.”
 
When ...

 + photos!,  read more

The Enigma Machine: A Window Into The History of Encryption

September 7, 2017
Today, our online banking, text messages, and ecommerce sites all use encryption to ensure our personal information is secure and stays out of the hands of those with malicious intent. Computers power this encryption, scrambling data using complex mathematical formulas in a matter of minutes, but that wasn’t always the case.
 
In World War II German armed forces had a different method of encryption. ...

 + photos!,  read more

How Secure is Your Messaging App?

August 17, 2017
Everyone with a smartphone uses messaging apps to communicate with friends, family, and coworkers. iMessage, Facebook, Snapchat, Instagram, Twitter, Wechat, WhatsApp, Facetime, Google Hangouts, and Skype are just some of the apps dominating this over-saturated market. Amazon also plans to throw its hat into the arena with a messaging app called Anytime for smartphones, tablets, PCs, and smart watches. The app will have ...

 + photos!,  read more

Your Web Browser and ISP Know You Better Than You Think

August 3, 2017
Both your web browser and Internet Service Provider (ISP) are actively gathering data when you go online. They’re tracking information like the websites you visit, how long you stay on each page, where you’re logging in from, and what type of device you’re using. Even if you’re an upstanding citizen with a clean record and nothing to hide, the extent to which companies like Google and Comcast ...

 + photos!,  read more

The Basics of Bitcoin and What It Means for Cybersecurity

July 20, 2017
Bitcoin has been credited with revolutionizing and democratizing money production and has been accused of abetting illegal sales on the Black Market. In March 2017, the online currency’s value ($2,637.82 at the time of writing) even surpassed the value of an ounce of gold ($1,237).
 
For such a young currency, Bitcoin has made an inescapable splash across the world and it seems that influence ...

 + photos!,  read more

Amazon-Whole Foods Merger: Are We Putting All Our Eggs in One Basket?

July 6, 2017
Amazon’s recent acquisition of Whole Foods has many people wondering, have tech giants like Amazon gotten too big? Already the dominant player in online sales, could Amazon’s entry into brick and mortar threaten our country’s competitive open-market system? And what does all this mean for small businesses?
 
Amazon began as an online book reseller, expanding into cloud computing services ...

 + photos!,  read more

Why a CRM System is Crucial to the Success of Your Small Business

June 15, 2017
If you think your business is too small to warrant a CRM (customer relationship management) system, you may want to ask yourself a very important question: Does customer service matter to you and do you want to scale and grow your business? If the answer is yes (and we hope it is), then a CRM system is integral to the success of your business.
 
Here at Pagoda Technologies, we use a variety of online tools to help ...

 + photos!,  read more

Are Macs Really More Secure than PCs?

June 1, 2017
Most Mac users are confident in their computer’s ability to ward off cyberattacks, but should Apple fans be a little more wary? While it’s true that Macs do experience fewer attacks than PCs, this doesn’t mean that they’re entirely secure.
 
Here’s what you need to know about macOS security, its vulnerability to cyberattacks and viruses, and how it compares to Windows.
 
Smaller ...

 + photos!,  read more

WannaCry Ransomware Reminds Us Why It’s Important to Update Our Operating Systems

May 18, 2017
 
 
When was the last time you updated your operating system? What if ransomware attacked your computer and encrypted your files--would you have a recent backup so that you could easily recover all that you’d lost?
 
The WannaCry ransomware that first emerged in the UK healthcare system on Friday, May 12, has people across the world asking themselves these very questions. As of ...

 + photos!,  read more

5 Ways Technology Can Reduce The Environmental Impact of Your Business

May 4, 2017
Technology can both reduce and increase our environmental impact. It just depends on how we use it. Monitors, backup systems, cell phones, SMART boards, and all the other technology required to run your business can result in sky-high energy bills and unnecessary energy waste. On the other hand, this very same technology allows us to reduce waste in other ways that can greatly reduce the environmental impact ...

 + photos!,  read more

8 Easy Hacks to Improve Your Productivity Online

April 20, 2017
Most of us sabotage our productivity on a daily basis without even realizing it. While technology can improve your efficiency, it can just as easily eat up time and energy if you’re not careful to have some limitations and organizational systems in place.
 
Check out these 8 life hacks that will instantly improve your productivity when working on a computer.
 
1.  Create a virtual to-do ...

 + photos!,  read more

The Fate of Internet Privacy Protection and Your Personal Electronic Data

April 5, 2017
Have you ever thought about how much of your personal data is stored online? Once you start making a mental list of all the apps, accounts, and email servers that store everything from your birth date to your credit card number, you may start feeling a little queasy. Is all that data actually secure? Who has access to this personal information and what are they doing with it?
 
Before we dive into ...

 + photos!,  read more

The AWS Evolution: From Bookseller to Cloud Computing King

March 16, 2017
Jeff Bezos named Amazon after the world’s largest river because he hoped it would become the world’s largest bookstore. Fast forward a couple decades later, and Amazon has expanded far beyond an online book reseller, now dominating the market in products ranging from refrigerators to dog food. Perhaps the most surprising market, however, that Amazon now dominates, is cloud computing services (storing and ...

 + photos!,  read more

7 Cyber Security Myths Debunked

March 1, 2017
Far too many small businesses put themselves at risk because they don’t understand the real threats of cyber security. There are quite a few cyber security risks that are accepted as fact, opening up IT networks to hackers and large-scale data loss. We put 7 of these common cyber security myths to bed so that you can decrease the chances of an attack and mitigate the damage.
 
1.  Hackers ...

 + photos!,  read more

How to Protect (and Grow) Your Online Presence as a Small Business

February 15, 2017
No matter what type of business you run, it’s probably safe to guess that you have an online presence and manage most or all of your business through a computer network. It’s probably also safe to guess that if your network crashed or your website went down, you would be losing money (or potential clients) until the issue was resolved.
 
There is no doubt about the importance of protecting ...

 + photos!,  read more

9 Useful Apps Every Business Owner Should Know About

February 2, 2017
As a small business, tasks like invoicing, scheduling meetings, and prioritizing projects can take valuable time and energy away from your core offerings and the needs of your customers.
 
At Pagoda Technologies, we’ve tried and tested many business apps to help with everything from financing to internal and external communication. Here are some of our favorite apps that have helped us streamline administrative ...

 + photos!,  read more

The Internet of Things: Ten Oddly Useful Smart Home Devices

January 19, 2017
The internet of things (IoT) is rapidly weaving itself into the fabric of our daily lives. From smartphones to smart HVAC systems like the Nest Thermostat, our world is increasingly connected through our everyday objects.
 
Although the IoT poses significant security risks, it is also an exciting new frontier that’s paving the way for a future that transcends physical boundaries and allows you to achieve more ...

 + photos!,  read more

G Suite versus Office 365: Finding the Best Solution for Your Business

January 5, 2017
The competition is neck and neck between Google’s G Suite (previously Google Apps) and Microsoft’s Office 365. Although G Suite led the way as the cloud-based option for online business collaboration, Office 365 has quickly caught up and has its own pack of loyal followers.
 
For many, the debate hinges on subjective opinions - do you identify with Google or Microsoft? - but there are subtle ...

 + photos!,  read more

11 Tech Gadget Gifts for Everyone on Your List

December 6, 2016
Holiday shopping doesn’t have to mean countless hours at the mall, searching in vain for the perfect gift. We’ve done the research for you to find some of the best gifts in tech for everyone on your list. From a smart flowerpot to an affectionate robot, here are our top 11 picks for tech gadget gifts this year:  
 
1. For the Windows fan: Dell XPS 13 $799
This sleek and lightweight ...

 + photos!,  read more

How Hackers Used the Internet of Things (IoT) to Launch the World’s Largest Cyberattack

December 1, 2016
We are increasingly connected to the internet through everyday objects, from smartwatches and phones to smart-fridges and heating systems. As of this year, an estimated 6.4 billion things are connected to the internet and this number is expected to increase to a staggering 21 billion as of 2020.
 
Known as the internet of things (IoT), the convenience of a connected world comes with a price. The incredibly fast ...

 + photos!,  read more

How to Build a Disaster Recovery Plan

November 17, 2016
According to the UK’s Department of Trade and Industry, 70% of businesses that suffer a major data loss go out of business within a year. With consequences like that, it is crucial for businesses to have a data recovery plan. There are three parts to a well thought out data recovery plan: Planning, Storage and Recovery. Each part is important, and each one should have a plan of its own. Below we go through ...

 + photos!,  read more

Office 365 Editions: Is it Right for Your Business?

November 3, 2016
Image from digitalrivercontent.net
Only a month after Microsoft launched its new Office 365 Home Premium for individuals and families, the company also launched an update to Office 365 for business users. Office 365 has had both negative and positive feedback, the negative mostly comes from their licensing changes. However, small and large business owners alike should see what Office 365 has to offer. Below ...

 + photos!,  read more

Security Tip: Cybersecurity for Electronic Devices

October 20, 2016
Image from:healthcareitnews.com
 
Cybersecurity extends beyond computers.
In past blog posts, we’ve discussed how the human element is the most vulnerable to security breaches. Humans are what allow cyber criminals to take over technology. With technology advances in the last 10 years we have to consider security for not only computers, but cell phones, tablets, video games, car ...

 + photos!,  read more

Cutting IT Costs in the 3rd Quarter

October 6, 2016
Image from: dailydot.com


The end of the year is just around the corner. As we make our way into the 3rd quarter it is time to ask yourself how you can save money and finish out the year in a strong financial state. IT is essential to businesses.We’ve written about this at length in our other blog posts, but where is IT not essential? Where can we all save a little money and become more ...

 + photos!,  read more

Staying Relevant in a Changing Tech Industry

September 29, 2016
It is time to face the facts: technology is changing faster than ever. Normally presented as a positive, technological improvements can also be a threat to established businesses. The rise of emerging tech businesses may give consumers more choices, but can lead to increased competition for existing businesses and even a complete industry overhaul with new business models empowered by the latest advances in IT.
 
&ldqu...

 + photos!,  read more

Best Practices For Securing Your Devices While Traveling

September 9, 2016
Image from: www.travelfreak.net
 
The Global Business Travel Association estimates that in 2016 more than $1.3 million business trips will be taken in the US. On these business trips many employees are using company distributed cell phones, lap tops, smart devices and more. The risk of cyber attacks in normal situations at any company is high, when employees are traveling all over ...

 + photos!,  read more

5 Technology Predictions That Should Make You Cringe

August 18, 2016
Image from: thenextweb.com
It is 2016 and we are developing technology at a faster rate than ever before. The Internet of Things (IoT) is getting larger, Artificial Intelligence (AI) is getting smarter, and the wealth of technology at our fingertips is staggering. However, this wealth of technological innovations comes with a price. We have compiled a list of things that you may not have considered when it comes ...

 + photos!,  read more

Pokemon GO: Not All Fun And Games

August 5, 2016
Here at Pagoda Technologies, we are constantly trying to keep our customers updated on security risks and personal data breaches. More often than not, the leading cause of data security breaches is human error, but every once in awhile there is a serious bug somewhere in the system that leads to compromised data. This week, we bring you something that happens to address both issues: Pokemon GO.
Pokemon GO is an Augmented ...

 + photos!,  read more

Why Did Microsoft Purchase LinkedIn?

July 21, 2016
Image from http://www.recentfusion.com/
 
On June 13th of this year Microsoft announced that they have entered into a definitive agreement under which Microsoft will acquire LinkedIn for $196 per share in an all-cash transaction valued at $26.2 billion, the largest acquisition in the company's history. LinkedIn gets to stay mostly the same, leaving them their logo, their culture, ...

 + photos!,  read more

2016: The Year of Ransomware

July 7, 2016
On February 6th of this year, computers at a Hollywood Presbyterian Medical Center become infected with the .locky virus that shut down their communication capabilities. After a few days when the hospital had to resort to keeping records with pen and paper, they paid a ransom of 40 bitcoins (approximately $17,000) and regained access to their computer system.
 
This is happening all the time to hundreds ...

 + photos!,  read more

A Few Areas Where Your Business Might Need Help in the IT Department

June 16, 2016
 
Images from unsplash.com
 
Many of us, in this technology age, have become very proficient at running our own businesses and managing the IT side of things ourselves. We have Google Drive storage down to a science, LastPass seems to work great and you get a new laptop every few years to stay ahead of the planned obsolescence.
 
However, working as the default company ...

 + photos!,  read more

Nearly 90 Percent of Android Smartphones Are Vulnerable to Malware

June 2, 2016
"For a user running a vulnerable version of Android, it's as simple as going to a website, connecting to a rogue AP or being under traffic redirection attack, and you get compromised," said Zuk Avraham, founder and CTO of Zimperium. "It's a (relatively) fast and reliable attack."
 
About 90% of Android users are currently vulnerable to malware attacks. There is even a website dedicated to charting ...

 + photos!,  read more

How to Protect Your Business from the Locky Ransomware

May 19, 2016
Image from blog.kaspersky.com 
 
Locky Ransomware is the new way for cyber criminals to take a hostage, and hold them until you send payment. Except instead of holding a person hostage, they just hold all of your important files on your computer, encrypt them and demand money for the key. The tell tale sign of the ‘Locky’ ransomware is that your important files will all have changed the ...

 + photos!,  read more

The End of Moore's Law?

May 5, 2016
“Moore's law refers to an observation made by Intel co-founder Gordon Moore in 1965. He noticed that the number of transistors per square inch on integrated circuits had doubled every year since their invention. Moore's law predicts that this trend will continue into the foreseeable future. Although the pace has slowed, the number of transistors per square inch has since doubled approximately every 18 months.” ...

 + photos!,  read more

Introducing Polaris Office

April 21, 2016
You are probably using Microsoft Office in some capacity in your everyday life as well as at work. Microsoft Office includes Word, Excel, PowerPoint and Outlook. In 2012 Softpedia declared that over 1 billion people are using Microsoft Office, and 4 years later than number has no doubt increased. However, using Microsoft Office across multiple devices can be a huge ordeal. The interface has never been stellar and things ...

 + photos!,  read more

3 IT Trends to Watch in 2016

April 7, 2016
 
Although we are a few months into 2016, there are three crucial IT trends you should be aware of that we think will make a difference to business owners..
 
 
Wearable Technology is on the Rise. It is likely that in the next year we will see more and more wearable tech. According to McAfee Labs, “780 million: The number of wearable devices by 2019.” This means ...

 + photos!,  read more

New Keyboard Shortcuts in Windows 10

March 17, 2016
Windows 10 is the newest version of Windows, check out our last blog post on Windows 10 to see if making the switch is right for you.
Using Windows 10 comes with a lot of benefits, including some new shortcuts you might not have known about. We have compiled a list of shortcuts we think would most benefit the Pagoda Technologies customers.
 
Windows - Pressing the Windows button allows you to ...

 + photos!,  read more

The Right Way to Get Rid of Old Computers

March 3, 2016
The average total cost of a data breach in 2015 was $3.8 million, according to the Ponemon Institute's report, "2015 Cost of Data Breach Study: Global Analysis". This study also reported a 23 percent increase in data breaching since 2013. Safe to say, this is a serious issue for business owners.
 
Getting rid of an old computer or hard drive can seem like a simple task, however there are a few things ...

 + photos!,  read more

Should Your Next Computer Have An SSD?

February 18, 2016
Having a Solid State Drive, or an SSD in your computer comes with some advantages and disadvantages. First, what is an SSD and what does it do for you?
A solid state drive (SSD) is where your data is stored on your computer. This data includes the computer’s operating system and could also include your documents, music collection, pictures of your last vacation or your favorite movies you’ve stored on your ...

 + photos!,  read more

Should You Upgrade Your Home Computer To Windows 10?

February 4, 2016
 
In September 2014, Microsoft unveiled their new operating system, Windows 10. However it wouldn’t be until 10 months later in July 2015, that Microsoft would unleash Windows 10 on to its consumer base. Following its release, Microsoft wants Windows 10 to be installed in 1 billion devices in the next three years. With that goal in mind, it is important to at least understand what Windows 10 is and ...

 + photos!,  read more

5 Mistakes Small Businesses will Make in 2016 (and how IT can fix them)

January 21, 2016
Running a small business is much like steering a large ship. You spend a lot of time crafting it and getting ready to sail, and once you are out on the water most things run pretty smoothly. However, you can’t always see the obstacles headed your way. Are you going to run into shallow waters? Hit an iceberg? Lose some crewmembers overboard?
Business owners can’t do everything themselves. Having IT support ...

 + photos!,  read more

5 Things You Need to Prepare For Your 2016 IT Budget

January 7, 2016
With the new year upon us, there are a few key things you need to take care of. An important one that must be carefully reviewed, planned and measured is the 2016 IT budget.
If you are working at a business that depends heavily on your IT (and let’s face it, what business doesn’t) and you have goals to grow and expand your company in 2016, then you definitely need to budget for your IT needs. Here are 5 ways ...

 + photos!,  read more

How Social Media Can Leave Your Company Vulnerable to Cyber Attacks

December 17, 2015
A few weeks ago we wrote a blog about the risks of spear phishing email attacks that can leave your company vulnerable to cyber attacks. A seemingly harmless email from someone you trust shows up in your inbox with an attachment. Unsuspecting employees click the link or download the file and suddenly the whole network is compromised.
Back in the old days email was the most vulnerable part of a company's defense ...

 + photos!,  read more

3 Things to Know About Using an E-Signature in Your Business

December 3, 2015
Did you know that since 2000 e-signatures (electronic signatures) have the same legal standing as physical signatures in the US? The Electronic Signatures in Global and National Commerce Act made it so 15 years ago.
With these e-signatures holding so much legal weight, it’s important they are used correctly.
 
Here are 3 things you need to know about using an e-signature in your business.
 
1. ...

 + photos!,  read more

Why you Need to Outsource Your IT Department

November 19, 2015
Running a business is tough. And as a business owner, you have more than enough to think about when making decisions. There is HR to consider, clients to manage, advertising, employee training and of course the IT department. With today’s advances in technology, we depend on our IT people more than ever in a business setting.
 
So what’s a business owner to do?
 
You ...

 + photos!,  read more

Apple OS X No Longer Secure?

November 5, 2015
For a long time, Apple has been known as having the most secure OS out there. It’s sleek, it’s secure, the systems are impenetrable right? Right?
 
Well not so much.
 
After a few high profile breaches of security, it has become clear that maybe apple products aren’t quite as safe as they once were.
 
But were they even secure in the old days? ...

 + photos!,  read more

5 Myths About Computer Maintenance that Need Busting

October 15, 2015
We all want to keep our computers clean and healthy, they power our jobs, our personal connections, our relationships with faraway relatives. No matter how you use them, computers are a very important part of our lives.
Keeping them running and in good health can be complicated, and advice on how to keep them that way can be well meaning but ineffective or even harmful to your computer.
 
Here are ...

 + photos!,  read more

Adblock Plus Can Protect You From Annoying Ads, But At What Cost?

October 1, 2015
Adblock Plus Can Protect You From Annoying Ads, But At What Cost?
 
Adblock Plus is an extremely useful tool for anyone surfing the web, no more pesky ads, no more accidentally clicking away from the page you were trying to arrive at. It makes user’s lives infinitely easier and you get a much cleaner internet experience. Ad free browsing is what most of us hope for.
 
 
The ...

   read more

The Difference Between WEP, WPA, and WPA2 Wireless Encryption (and Why It Matters)

September 23, 2015

Even if you know you need to secure your Wi-Fi network (and have already done so), you probably find all the encryption acronyms a little bit puzzling. Read on as we highlight the differences between encryption standards like WEP, WPA, and WPA2–and why it matters which acronym you slap on your home Wi-Fi network.

 

Full Article



   read more

Santa Cruz Tech Beat meets Pagoda Technologies

September 17, 2015

Check out the article about Pagoda in Santa Cruz Tech Beat

 



   read more

Cloud Security, How your Employees are Putting your Company at Risk

September 3, 2015
Cloud Security, How your Employees are Putting your Company at Risk
 
Cloud Security is one of the most important aspects of a company’s overall security, and as it turns out, the most insecure part of a business computer system is not the software you install, or the passwords you use, but the employees themselves.
 
Employees are one of the biggest risks to a company’s ...

   read more

Home Depot Hack Turns Into Criminal Negligence Scandal

September 30, 2014
CyberheistNews Vol 4, 39  
http://blog.knowbe4.com/
 
Wait for the class-action lawsuits to get unleashed. The lawyers are going to be all over this one like white on rice. Ex-employees from the Home Depot IT technology group are now claiming that management of the retailer had been warned for years that their Point Of Sale systems were open to attack and did not act on these warnings. Several members of the ...

   read more

Cryptolocker Being Spread Via YouTube Ads

August 26, 2014
CyberheistNews Vol 4, 34
Editor's Corner
 
VirusBulletin reported that cyber criminals now spread around Cryptolocker / CryptoWall via YouTube. Malware researchers Vadim Kotov and Rahul Kashyap discovered the cyber criminals purchase advertising space and use exploit kits to infect workstations. 
They ran into this while checking YouTube and website banners for situations where malware writers had in fact bought ...

   read more

8 Ways iPhone Users Give Up Privacy, Threaten Security

August 6, 2014
Hundreds of popular applications in the Apple App Store seek location-tracking permissions, access to contacts, email and other sensitive information, according to a study of more than 500 apps. Is granting permission to an app worth the privacy invasion?
Apple's walled-garden approach keeps out many nefarious applications that embed hidden functions designed to steal data. But privacy and security issues still abound ...

   read more

Google Chromebooks successful in schools

July 31, 2014
A lot of schools were sold on iPads right after those became available and students probably still prefer them over Chromebooks, but they are relatively expensive compared to Chromebooks and harder to manage. Google also offers admins easy ways to manage large Chromebook deployments from a single console while Apple is still catching up when it comes to this.  
 
Good Shepherd Catholic School, ...

   read more

Scam Of The Week: Mobile Ransomware

May 13, 2014
Here is a heads-up for your users that use mobile devices (and who doesn't). There are two mobile scams sticking up their ugly heads. First is using messages from "trusted" mobile apps to install malware on PCs. Second is the first mobile ransomware for Android. Send this (feel free to edit as much as you like) to your users and give them another heads-up. 
"The bad guys use what we call "social engineering" to ...

   read more

Important: Homeland Security Says Stay Off IE

April 29, 2014
http://www.pcworld.com/article/2148921/dhs-warns-against-using-internet-explorer-until-bug-is-patched.html?inf_contact_key=918995e2ab5ea4c6edf72a9fc78f6ed2822ba3b0d6970c0167d7bf9ff604e163
A vulnerability discovered in Internet Explorer over the weekend is serious—serious enough that the Department of Homeland Security is advising users to stop using it until it’s been patched.
On Monday, the United ...

   read more

Scam Of The Week: Blended XP Phishing Security Threat

April 22, 2014
From: CyberHeist News http://blog.knowbe4.com/ 
During the first quarter, I have been warning about the coming wave of Windows XP-related scams having to do with the April 8 End Of Life of XP. Here is what you can expect, and many variants will follow. It is important to warn your end-users about this, even if they -are- running more recent versions of Windows, because often they do not know what version they ...

   read more

Would you buy a Blackberry now?

November 5, 2013
New BlackBerry CEO, $1 billion cash infusion renew enterprise customer optimism
 
Jake O'Donnell, News Writer
Published: 04 Nov 2013
Industry experts view this week's news that BlackBerry will have a new interim CEO as well as a $1 billion infusion of new cash as a positive for the much-maligned mobile giant.
John Chen, formerly of Sybase, Inc., will take over as interim CEO from Thorsten Heins, who will ...

   read more

Top 5 Tablet Brands? Which will you get?

November 1, 2013
Top Of The Line Tablets
The verdict is in for third-quarter tablet shipment numbers: Shipments are increasing and the brand gap is shrinking.According to IDC Worldwide Tablet Tracker, 47.6 million tablets were shipped in the third quarter, a 36.7 percent year-over-year growth. While the lack of a new iPad launch in both the second and third quarter slowed Apple sales, a variety of Android products rose in popularity. ...

   read more

Is Dell getting its mojo back with new tablets and notebook PCs?

October 7, 2013
NEW YORK -- Michael Dell's initiative to take Dell private sailed past regulatory obstacles this week while the company attempts to make strides and become a leader in tablets and notebooks PCs.
The company unveiled what analysts believe are attractive bring your own device (BYOD) products and a cloud service that may give corporate IT shops reason to notice Dell in the sea of mobile computing platforms.
"Dell has the ...

   read more

BlackBerry To Go Private Under $4.7 Billion Deal With Fairfax

September 23, 2013
http://crnnetwork.com/portal/wts/cgmceDmejABaeeBf36i7uzEarS4sfua
BlackBerry announced Monday it has agreed to a letter of intent led by Fairfax Financial Holdings that would take the ailing smartphone company private for $4.7 billion.
Toronto-based Fairfax already owns a 10 percent stake in the company. Also involved in the consortium are Merrill Lynch and BMO Capital Markets. The transaction has already been approved ...

   read more

Protect your Twitter account with Twitter's new two-factor authentication

August 7, 2013

On Wednesday, Twitter unveiled a new two-factor authentication method for Android and iOS that allows you to authorize login requests to your Twitter account with just one tap, banishing the usual method of manually inputting security codes generated via an app or sent via text method. Just open up the Twitter app on your smartphone or tablet, authorize the login with one finger press:

Learn more here



   read more

Google Chrome browser exposes passwords: How to secure your browser

August 7, 2013
Google Chrome policy exposes user passwords on purpose: Here's how to prevent it
Jared writes for PCWorld and TechHive from his remote outpost in Cincinnati.
More by Jared Newman

Google is taking some serious heat for the way Chrome can reveal all your saved passwords to anyone—anyone!—with access to your computer. Yet Google has defended the move, with Chrome's security tech lead arguing ...

   read more

Touch Chrome ?

August 5, 2013
Gesture controls (finally!) appear in Chrome's bleeding-edge Canary test build.
There's no two ways around it: With Microsoft pushing the modern UI in Windows 8 and Intel requiring touchscreen support in all Haswell-powered Ultrabooks, PCs have officially entered a new era of finger-centricness. Google appears poised to get with the times, as several touch-tastic new gesture controls have been spotted in Canary, ...

   read more

Android Security Risk Unveiled

July 16, 2013
Android ‘Master Key’ Security Hole Puts 99% Of Devices At Risk Of Exploitation
Mobile security startup Bluebox Securityhas unearthed a vulnerability in Android’s security model which it says means that the nearly 900 million Android phones released in the past four years could be exploited, or some 99% of Android devices. The vulnerability has apparently been around since Android v1.6 (Donut), ...

   read more

Phishing Attacks Increase: How to protect yourself and your business

June 25, 2013
CyberheistNews Vol 3, 26
"Train Or Feel The Pain"
More users than ever are experiencing phishing attack attempts. Researchers at Kaspersky Lab have documented a drastic increase in the number of web users who have been "subjected" to phishing attacks over the past year, according to a new report. 
The Moscow-headquartered security firm found that 37.3 million people faced the prospect of being phished in 2012 to ...

   read more

Immortality soon within reach? Head Google Engineer at Global Future Congress: Treating biology as software

June 17, 2013
Published: Monday, 17 Jun 2013 | 7:45 AM ET
By: Cadie Thompson | Technology Editor, CNBC.com
 
Image source: 2045.com
Immortality may not be a reality yet, but rapidly evolving technology is making it more realistic, Google's engineering director told the Global Future 2045 World Congress.
"The life expectancy was 20 1,000 years ago. ... We doubled it in 200 years. This will go into high gear within ...

   read more

Thinking about a super phone upgrade? Which would you choose?

June 6, 2013
A Nexus Between Rivals
Google this week unveiled its latest Nexus device -- the Nexus 4 -- a smartphone in white made by LG that's somewhat akin to Samsung's Nexus S in that it's unladen with vendor-specific baubles that can drive developers batty.
Selling unlocked for GSM networks starting at $299,Nexus 4 specs are fairly impressive. How do they stack up against Apple's iPhone 5? The CRN Test Center ...

   read more

Head-To-Head: Samsung Galaxy Note 8 Vs. Apple iPad Mini

May 30, 2013
Tablet Mini-War
By Edward J. Correia CRN
With the release last month of the Galaxy Note 8, Samsung once again looks to take a bite out of Apple's tablet market share. When we compared Apple's iPad Mini vs. the Galaxy Note 10.1 last winter, Samsung had not yet invented the 8-inch version. Samsung's smaller Note is just as capable as the larger, and has features unique among tablets to date.
It ...

   read more

Samsung and Android put pressure on Apple. Are you in the Galaxy or in iOS?

May 29, 2013

10 Ways Samsung Is Making Apple Sweat
Samsung is in the midst of one of the most exciting periods in its history. When the company was founded, it was hoping its consumer electronics would help it establish a foothold in the United States. Now years later, Samsung has not only established a foothold in a number of markets, but the company has found a way to uproot some of the key players in those markets and become ...

   read more

Hackers Moving from Underground to Mainstream Sites

May 7, 2013
By Tracy Kitten, April 26, 2013.  Follow Tracy @FraudBlogger
Within the last week, researchers at security vendor RSA stumbled upon a Facebook page called Casper Spy Botnet that hackers and malware developers were using to promote and sell the legacy banking Trojan Zeus.
The page has since been deactivated, says RSA's Limor Kessem, a top cyber-intelligence expert within The Security Division of EMC. But it's likely ...

   read more

Facebook Used to Market Banking Trojans

May 7, 2013
Hackers were using a Facebook page as a how-to site for financial crime and to sell banking Trojans. One RSA security expert says this public promotion signifies
 
Within the last week, researchers at security vendor RSA stumbled upon a Facebook page called Casper Spy Botnet that hackers and malware developers were using to promote and sell the legacy banking Trojan Zeus.
The page has since been deactivated, says ...

   read more

Amazon Developing Device to Stream Video to Homes

May 1, 2013

By GREG BENSINGER
Amazon.com Inc. AMZN +1.63% is developing a set-top box to stream video content that it may release sometime this year, according to people familiar with the company's development plans.
The device could help build Amazon's brand in the living room, where the e-commerce giant is dependent on other devices to stream its expanding video content available as part of its Prime ...

   read more

Adobe PDF Zero-Day Flaw Enables Location Tracking

April 30, 2013
By Robert Westervelt
April 29, 2013    3:26 PM ET
 
McAfee has detected ongoing attacks targeting an Adobe (NSDQ:ADBE) Reader zero-day vulnerability that could enable attackers to conduct location tracking of a malicious file.
The firm said it detected malicious PDF files that can enable a sender to see when and where a file is opened, wrote Haifei Li, a McAfee threat researcher. While the flaw is ...

   read more

The Expense That Cloud Customers Often Forget

April 22, 2013
By Ken Presti
A move to the cloud is typically a lengthy and detailed discussion that covers a variety of key areas, including cost analyses, infrastructure decisions, security risks, and a host of other elements. But channel partners tend to agree that one very important aspect tends to slip through the cracks.
"People don't factor the cost of cloud bandwidth into the equation as often as they should," said Daniel Cheng, ...

   read more

Scams Exploit Boston Marathon Explosion

April 18, 2013
Malicious actors are exploiting the April 15 explosions at the Boston
Marathon in attempts to collect money intended for charities and to
spread malicious code. Fake websites and social networking accounts have
been set up to take advantage of those interested in learning more
details about the explosions or looking to contribute to fundraising
efforts.
For example, the Twitter account @_BostonMarathon was created shortly
after ...

   read more

Should you trust that App?

April 12, 2013

Report: Apple, Android Apps Riddled With Coding Flaws
Mobile applications on Google Android and Apple iOS devices are riddled with vulnerabilities and weaknesses, according to application security vendor Veracode Inc.
Poorly implemented encryption and a bevy of Web application vulnerabilities in Google (NSDQ:GOOG) Android and Apple (NSDQ:AAPL) iOS apps open them up to determined attackers, according to an analysis of ...

   read more

Adobe Security Updates: Flash, Shockwave, Air and Cold Fusion

April 10, 2013
National Cyber Awareness System
Adobe Releases Security Updates for Adobe Flash Player
Original release date: April 10, 2013
Adobe has released security updates for Adobe Flash Player. These
vulnerabilities could potentially allow an attacker to take control of
an affected system or cause a denial-of-service condition.
Adobe has released updates to the following products:
 * Adobe Flash Player 11.6.602.180 and earlier ...

   read more

Blackberry ships Z10s but can they stay competitive?

March 29, 2013
BlackBerry Ships 1 Million Z10s But Subscriber Base Declines
By Rob Wright
March 28, 2013    3:32 PM ET
There was good news and bad news for BlackBerry fourth-quarter financial results.
The bad news first: BlackBerry lost another 3 million subscribers in the first three months of this year, with its customer base falling to 76 million subscribers.
But the good news is, BlackBerry shipped approximately ...

   read more

Facebook Black Scam Spreading Quickly

March 22, 2013
By Robert Westervelt
Facebook users are being warned to avoid a quickly spreading scam on the social network called "Experience Facebook Black," which ends up being a series of surveys designed to collect data on victims. The speed at which the scam is spreading has forced Google (NSDQ:GOOG) to take action to protect users.
The attack is using Amazon (NSDQ:AMZN)'s S3 cloud storage service to host the campaign, according ...

   read more

Verizon Announces Android 4.2.2 Update for the Galaxy Nexus

March 21, 2013
Verizon has announced that the Android 4.2.2 update for the Galaxy Nexus will start rolling out in phases today, March 19. No, this is not some sort of sick joke.
We’re assuming it’s the same build that leaked a couple of weeks ago as Android 4.2.2 build JDQ39. We’re still waiting for the support docs to arrive, so we won’t know for sure until that happens. But since JDQ39 is ...

   read more

Is Microsoft's second tablet a better value than Apple's fourth?

March 11, 2013


   read more

Chromebook Pixel vs. MacBook Air

February 28, 2013


   read more

Is My Data Safe In the Cloud?

February 25, 2013


   read more

Adobe prompting you to update? You should!

February 21, 2013
Adobe has identified critical vulnerabilities (CVE-2013-0640, CVE-2013-0641) in Adobe Reader and Acrobat XI (11.0.01 and earlier) for Windows and Macintosh, X (10.1.5 and earlier) for Windows and Macintosh, 9.5.3 and earlier 9.x versions for Windows and Macintosh, and Adobe Reader 9.5.3 and earlier 9.x versions for Linux.  These vulnerabilities could cause the application to crash and potentially allow an attacker ...

   read more

Security updates available for Adobe Shockwave Player

February 13, 2013
Release date: February 12, 2013
Vulnerability identifier: APSB13-06
Priority: See table below
CVE number: CVE-2013-0635, CVE-2013-0636
Platform: Windows and Macintosh
SUMMARY
Adobe has released a security update for Adobe Shockwave Player 11.6.8.638 and earlier versions on the Windows and Macintosh operating systems.  This update addresses vulnerabilities ...

   read more

What BlackBerry Got Right And Wrong With BB10

February 1, 2013

Analysis: What BlackBerry Got Right And Wrong With BB10
BlackBerry launched its new BlackBerry 10 OS this week, and CRN looks at what the company got right, like BlackBerry Q10 smartphone and the BlackBerry World Store, and what it got wrong.
For the company formerly known as Research In Motion (NSDQ:RIMM), the BlackBerry 10 launch this week is the first step of an ambitious comeback plan.
But, the groundwork for this ...

   read more

Google Declares War on the Password

January 23, 2013

BY ROBERT MCMILLAN  01.18.13
MOUNTAIN VIEW, California — Want an easier way to log into your Gmail account? How about a quick tap on your computer with the ring on your finger?
This may be closer than you think. Google’s security team outlines this sort of ring-finger authentication in a new research paper, set to be published late this month in the engineering journal IEEE Security & ...

   read more

Is Microsoft Investing Up To $3B In Dell Buyout?

January 22, 2013
By Scott Campbell
Could Microsoft (NSDQ:MSFT) be in talks to invest up to $3 billion in PC partner Dell (NSDQ:Dell)?
According to a report by CNBC, Microsoft is a possible "mezzanine" -- or preferred financing partner -- for between $1 billion and $3 billion in Dell's reported interest in a leveraged buyout.
Dell has had discussions with several financing organizations about going private, a move that could require up ...

   read more

Oracle Releases Out-of-Band Patch to Address Java 7 Vulnerability

January 14, 2013
Oracle has released an out-of-band patch to address the recently
announced vulnerability in Java Runtime Environment (JRE) 7. US-CERT
encourages users and administrators to review the bulletin and follow
best-practice security policies to determine which updates should be
applied.

Relevant URL(s):
<http://www.oracle.com/technetwork/topics/security/alert-cve-2013-0422-1896849.html>

   read more

Amazon's top selling laptop doesn't run Windows or Mac OS

January 9, 2013


   read more

Time to update your browser:

December 13, 2012
Google Releases Google Chrome 23.0.1271.97
Original release date: December 13, 2012 Last revised: --
Google has released Google Chrome 23.0.1271.97 for Windows, Mac, Linux, and ChromeFrame to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or cause a denial of service.
US-CERT encourages users and administrators to review the Google Chrome Release blog entry and ...

   read more

Phone security: Is YOUR phone secure?

December 12, 2012
Orange Android devices will come pre-installed with the Lookout Mobile Security applicationto prevent mobile devices being affected by malware and spyware.
The application will run in the background of the device, scanning applications and offering warnings to the user if a security threat is found.
Most of Orange’s catalogue of Android devices, including Sony, HTC and Samsung, will ...

   read more

Microsoft Surface: Sales slow out the gate but why?

December 6, 2012

Surface sales not great, but is it a management issue? Are you thinking of buying a tablet? Check out our Facebook page for this story and other technology related news and reviews.

http://www.facebook.com/PagodaTechnologies



   read more

Are you ready for the Holiday Season?

November 24, 2012
Holiday Season Phishing Scams and Malware Campaigns
Since the winter holiday is quickly approaching, Pagoda is republishing this entry to increase awareness about phishing scams and malware campaigns.
In the past, security tracking agencies have received reports of an increased number of phishing scams and malware campaigns that take advantage of the winter holidays and holiday shopping season. Users who are new to making ...

   read more

It can happen to anyone. How can you stay protected?

November 20, 2012

Hacker Exposes MSP Platform Vulnerability
A security researcher demonstrated zero-day vulnerabilities in MSP platforms of Kaseya and ManageEngine, according to a report.
The researcher, whose name was withheld, presented the findings at the Kiwicon security conference in Wellington, New Zealand, according to SC Magazine in Australia.
In the demonstration, the researcher created an administrator account on Kaseya by ...

   read more

Sinofsky's Departure, Windows 8 Direction

November 14, 2012

Microsoft Partners Weigh Sinofsky's Departure, Windows 8 Direction
 
Microsoft (NSDQ:MSFT) is staying mum about the details behindthe sudden departure of Steven Sinofsky, the company's top Windows executive. Speculation among channel partners and industry analysts centers on reported friction between Sinofsky and other Microsoft executives and questions about the demand for Windows 8 and the availability ...

   read more

Google Nexus 10 vs Samsung Galaxy Tab 2 10.1

November 6, 2012
Compare Google Nexus 10 VS Samsung Galaxy Tab 2 10.1 full specifications side by side. See the common features and the differences that make them better or worse.


   read more

Tablet wars continue: iPad vs Nexus 10

November 1, 2012


   read more

Help after Sandy

October 31, 2012


   read more

Head-To-Head: iPad Mini Vs. Amazon Kindle Fire HD Vs. Google Nexus 7

October 25, 2012
A 'Little' Friendly Competition
Don't let the "mini" name fool you.
Apple's iPad mini packs a punch despite its scaled-down size, touting a number of robust features and specs that even the most fanatic Apple followers didn't see coming. But, how does it shape up against the Google Nexus 7 and Amazon Kindle Fire HD, the two tablets that have traditionally set the standard in the 7-inch space?
Take a look.
http://www.crn.com/slide-shows...

   read more

When did IT become the Internet police?

October 22, 2012

 End users no longer have to rely on corporate networks for Internet access. As such, the antiquated, draconian IT controls around Internet access need updating.
It's a scene being replayed at businesses all over the world: Employees have seemingly infinite access to a vast array of technology that allows for uncontrolled access to the Internet. Millennials entering the workforce have never been in an ...

   read more

Microsoft Surface tablet price the least of IT pros' concerns

October 19, 2012

If you ask IT pros what they care about most when they choose a tablet (other than the iPad) for the enterprise, you might guess they will say pricing.

You'd guess wrong.

In fact, Microsoft recently disclosed pricing for its ARM-based Surface tablets that puts it on par with Apple's iPad. For many IT pros, it's not enough . . .

  



   read more

Smartphone Buyer's Guide

October 10, 2012

Smartphones: Computer Weekly Buyer's Guide
by ComputerWeekly.com
The smartphone has transformed communication between mobile workers and their offices but at a cost.



   read more

Multiple monitors in Windows 7 - Easy Snapping

October 8, 2012
Snap is a great Windows 7 feature that allows you to quickly open two windows side by side, each using half the screen, by dragging each Window to opposite edges of the screen. If you have multiple monitors it’s hard to take full advantage of this feature because dragging windows to the edge can end up just moving them to the next monitor.
So how can you take full advantage of this great feature when using multiple ...

   read more

4 things to do before installing iOS 6 on your iPhone or iPad

September 30, 2012

Even if you’re not trading up for the iPhone 5, you can still make your old iPhone (or iPad, for that matter) new again by installing Apple’s iOS 6 software update onto your handset.


Why bother with the upgrade? Well, I can tick off at leastseven nifty new features right here

http://heresthethingblog.com/2012/09/19/4-installing-ios-6-iphone-ipad/#disqus_thread



   read more

Mac Attacks: Top 10 Bugs Targeting Apple

September 24, 2012
More Secure, Or Maybe Not
According to conventional wisdom, malware and similar types of exploits are reserved for the Windows community -- not for their slightly more hip cousins who, through the years, have remained committed to the Mac. While some people claim that Macs are more secure, others maintain that they merely present a lower profile, given that most businesses for a long time standardized almost exclusively ...

   read more

GoDaddy goes down

September 10, 2012
GoDaddy goes down, taking countless websites offline; Anonymous claims responsibility  by

   read more

DraftSight is a free, professional-grade 2D CAD product

September 10, 2012
DraftSight is a free, professional-grade 2D CAD product to help users create, edit and view DWG files. Download now athttp://www.3ds.com/products/draftsight/download-draftsight/
Mission
Download DraftSight
www.3ds.com


   read more

The truth about Goobuntu: Google's in-house desktop Ubuntu Linux

September 5, 2012
 
zdnet.com - Most Linux people know that Google uses Linux on its desktops as well as its servers. Some know that Ubuntu Linux is Google's desktop of choice and that it's called Goobuntu. But almost no one outside of Google...


   read more

Get 'Em While You Can: 9 Samsung Devices That Apple Wants Banned

August 30, 2012


   read more

Oracle Java JRE 1.7 allows untrusted code

August 28, 2012
Oracle Java Runtime Environment (JRE) 1.7 contains a vulnerability that may allow an applet to call setSecurityManager in a way that allows setting of arbitrary permissions.
 
Overview
Oracle Java Runtime Environment (JRE) 1.7 contains a vulnerability that may allow an applet to call setSecurityManager in a way that allows setting of arbitrary permissions.
Description
The Oracle Java Runtime Environment (JRE) 1.7 ...

   read more

How to Outrank Your Competition in Google

August 14, 2012

How to Outrank Your Competition in Google - Forbes
In order to learn about the secrets behind ranking high in Google, I turned to Lee Odden, who is the author of Optimize: How to Attract and Engage More Customers by Integrating SEO, Social Media, and Content Marketing. For over fourteen years, he has consulted with companies ranging from start-ups to Fortune 500 companies on how to attract and engage ...

   read more

VIDEO: Samsung Galaxy Tab 2 7.0 Reviewed

August 13, 2012
Does smaller mean better?
That's the question for the Galaxy Tab 2 7.0, the second generation of Samsung's 7-inch tablet. The Android tablet gets some improvements, such as an SD card slot and expanded storage capability of 32 GB, as well as a 1,024-x-600 display for full HD video playback.
 
Arguably, the best new feature for the 7-inch Galaxy Tab 2 is an infrared emitter than can take the place of pretty much ...

   read more

How Apple and Amazon Security Flaws Led to My Epic Hacking

August 9, 2012
In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all,
my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.
 
In many ways, this was all my fault. My accounts ...

 + photos!,  read more

Apple enhances enterprise mobile device security with biometrics

August 6, 2012


   read more

Dropbox confirms it was hacked, offers users help

August 2, 2012


   read more

Curious about the new Microsoft Office?

July 23, 2012

Office 2013:  This release features an intuitive design that works beautifully with touch, stylus, mouse or keyboard across new Windows devices, including tablets. The new Office is social and unlocks modern scenarios in reading, note-taking, meetings and communications and will be delivered to subscribers through a cloud service that is always up to date.
 
http://www.microsoft.com/en-us/news/Press/2012/Jul12/07-16OfficePR.aspx ...

   read more

Potential Dropbox security breach

July 23, 2012

IT pros have reason for concern because many people use the same logins and passwords for both work and personal services, industry watchers said. A security breach at Dropbox could potentially lead to a hacker finding access to corporate systems.


http://searchconsumerization.techtarget.com/news/2240159979/Potential-Dropbox-security-breach-underscores-cloud-app-insecurity



   read more

The 10 Coolest Smartphones Of 2012 (So Far)

July 19, 2012
http://www.crn.com/slide-shows/mobility/240003689/the-10-coolest-smartphones-of-2012-so-far.htm?cid=nl_mobi

   read more

Online Tracking: Should you Worry?

July 19, 2012
What's so bad about ad tracking on the web, a.k.a. behavioral targeting? Nothing, if you don't mind being a living


   read more

Firefox User Security: Mozilla Releases Updates

July 18, 2012
The Mozilla Foundation has released updates for the following products to address multiple vulnerabilities: 
 * Firefox 14 
These vulnerabilities may allow an attacker to execute arbitrary code, cause a denial-of-service condition, disclose sensitive information, operate with elevated privileges, bypass security restrictions, or perform a cross-site scripting attack.  Original release date: Wednesday, ...

   read more

REVIEWED: Google's Nexus 7 Tablet

July 18, 2012
Yes, Android tablets are nothing new. But Google's hardware partners like Samsung, Toshiba, and HTC haven't been able to come up with a true hit yet. So Google took things into its own hands with the Nexus 7, partnering closely with Asus to come up with what it hopes to be the best Android tablet experience possible.
It worked.
Read more: http://www.businessinsider.com/nexus-7-review-20...

   read more

With Google Now, Android Puts Apple's Siri To Shame

July 4, 2012

Google Now is exactly what I want in a virtual assistant. I don't need cutesy jokes and quips about which smartphone is the best. I need answers. And Google Now provides me with the answers I want. The end. (Sometimes I don't even have to ask. Google Now just knows what I need. Incredible.) 

Read more: http://www.businessinsider.com/google-now-better-than-siri-2012-7#ixzz1zh8o1plv



   read more

Google Nexus 7 Tablet: Move Over, Kindle Fire

June 29, 2012

It’s not the iPad Google is trying to kill with the Nexus 7, it’s the Kindle Fire.

http://abcnews.go.com/blogs/technology/2012/06/google-nexus-7-tablet-move-over-kindle-fire/



   read more