• cloudservers

  • protectyourdata2

Password Management

Header_Code

Keeping Your Accounts Secure

It seems that each new week brings another alert about hackers stealing account information and a warning to change your passwords. Having a strong password is not enough, criminals can get to your account through weaknesses that are outside of your control.

Constantly changing passwords makes managing those passwords challenging. There are tools that can help with this.

Password Management Tools

A password manager can help you keep track of your passwords allowing you to change your passwords often and retrieve them when needed. Some managers even aid in generating passwords. Stored passwords are typically secured behind encryption so that if your machine is compromised your passwords remain safe. Some well known and powerful password managers you can utilize are:

 

Scaling Back Windows 8

Windows

TechCrunch has a great article on the direction of the next Windows operating system. It appears that the mobile emphasis of Windows 8 will be more balanced in the next operating system offering. The result is the same app-store and live tiles, but with a more Windows 7 like desktop experience.   Read  the TechCrunch article…

Microsoft.com 20 Years Ago

1994-1994Apr-1995Aug-MS-com

For throw back Thursday, the Microsoft blog The Fire Hose has posted some great old school screen shots of Microsoft.com over the past 20 years. Check these screenshots out here.

More Than 1 Billion Passwords Stolen

password

The Washington Post reports that Russian hackers have stolen more than 1 billion (with a ‘b’) passwords. This breach was made by the group dubbed CyberVor and was discovered by Hold Security of Milwaukee. Some of the passwords have been sold and others have been used to disseminate spam. Users are advised to change their passwords….

A Major Blow to the CryptoLocker Ransomware

crypto-locker

FOX-IT and FireEye have partnered together and have been able to recover the private keys used in the CryptoLocker encryption which locks users out of their own files. They have also been able to reverse engineer the devastating ransomware. As a result of their efforts infected users can go to their website, upload an encrypted…

Is Your Car Vulnerable to Attacks?

Car

As we pack cars with a growing level of tech, such perks and features could leave your car vulnerable to hackers and the results could be extremely serious. As CNN reported, researchers have demonstrated that cars can have brakes disabled or even have the steering wheel commandeered. These tests however were done with the hacker sitting…

Are USB Vulnerabilities Worse Than They Seem?

USB

As you may already know, USB drives can infect computers with malware or other malicious software. Many liken the situation to reusing a contaminated needle. At present there aren’t many tools that address this potential entry point for hackers, so it is wise to be cautious with USB drives and what is stored on them as…

Is Fitness Tech Bad for Your Identity’s Health?

FIT

How would you like to tell cyber criminals When and where you usually go running, Where you live, Your age, sex, height, and weight, Where and when you are on vacation? If you use wearable fitness devices and someone hacks one of these gadgets, that as well as other information about you is exactly what the attacker…

The Average Cost of a Cyberattack

CyAttackCost

Individuals and small businesses can take comfort in thinking that it is the big entities that are the primary targets of cyberattacks. But the fact of the matter is no one is immune to attacks. Just how much do cyberattacks cost companies – large or small? According to the Ponemon Institute’s 2013 Data Breach Study each…

Beware of These Dangerous Cyber Attacks

CyAttack

NBC News Tech Security has just posted a helpful article educating users about four dangerous types of cyberattacks that many are falling victim to currently. The article not only describes the cyberattacks but also educates users on how to protect themselves and what to do should they fall prey to such attacks. The article discusses: Ransomware…