Category Archive: Connectivity

6 best IoT simulators for PC
  • 7
    Nov

6 best IoT simulators for PC

IoT simulators allow you to design, create and test IoT apps and devices without actually using real IoT boards. If you’re looking for an IoT simulator but you can’t decide which one to get, read this article to learn what...

Read More
Supercomputer superheroes attempt to autonomously find, plug software holes, for cash
  • 25
    Aug

Supercomputer superheroes attempt to autonomously find, plug software holes, for cash

Seven supercomputers competed in a contest to find software vulnerabilities Giant refrigerator-sized supercomputers battled each other on Thursday in a virtual contest to show that machines can find software vulnerabilities. The result: the supercomputers time and time again detected simulated...

Read More
NoMoreRansom.org launched to help Ransomware victims
  • 17
    Aug

NoMoreRansom.org launched to help Ransomware victims

A new web portal NoMoreRansom.org will now help you removing the ransomware without paying off your hard earned money to the attackers. EUROPOL, Kaspersky, Intel, Netherland Police have come together to form a No More Ransom initiative. NoMoreRansom.org will help...

Read More
Census: ABS website not attacked or hacked, Michael McCormack says
  • 10
    Aug

Census: ABS website not attacked or hacked, Michael McCormack says

Census: ABS website not attacked or hacked, Michael McCormack says The minister responsible for the census has directly contradicted the Australian Bureau of Statistics (ABS) by saying its website was not attacked on census night, despite confirming that the site...

Read More
Why ransomware criminals need great customer service
  • 25
    Jul

Why ransomware criminals need great customer service

Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers.... read full article

Read More
Bart ransomware shows it can be effective without sophisticated encryption
  • 13
    Jul

Bart ransomware shows it can be effective without sophisticated encryption

A new ransomware program making the rounds uses a simple, yet effective technique to make user files inaccessible: locking them in password-protected ZIP archives. The new threat is called Bart and shares some similarities—in the ransom note in particular—with Locky,...

Read More
New ransomware targets Office 365 users in Australia
  • 10
    Jul

New ransomware targets Office 365 users in Australia

Malware and ransomware mostly find their way to our machine via email. After a little work to fix the problem we dismiss it just as an attempt to access data. In reality, the situation is more worrisome. It is more...

Read More
Don’t run JavaScript email attachments: ​they​ can carry potent ransomware
  • 22
    Jun

Don’t run JavaScript email attachments: ​they​ can carry potent ransomware

Attackers are infecting computers with a new ransomware program called RAA that’s written entirely in JavaScript and locks users’ files by using strong encryption. Most malware programs for Windows are written in compiled programming languages like C or C++.... read...

Read More
What is an NAS and why do I need one?
  • 19
    Jun

What is an NAS and why do I need one?

There are many reasons why network attached storage (NAS) makes a great addition to your home or small office. Maybe you're sick of paying monthly cloud service fees, or maybe you need a lot more storage space than you currently...

Read More
How to stop ransomware: Backup can protect you, but only if you do it right
  • 19
    May

How to stop ransomware: Backup can protect you, but only if you do it right

Most forms of malware hide their infections, but ransomware boldly declares itself and demands money or you’ll never see your beloved files again. And if you haven’t taken the right precautions ahead of time, your choices really are either pay...

Read More