A recent sextortion scheme highlights the vulnerability users face when their data is stolen and used against them. The widespread threat made it seem as though a hacker had compromising video of a victim taken while visiting adult pornographic websites. The scammers threatened to release the video unless they were paid in bitcoins. Here’s a […]
How do you know that a hacker isn’t tracking your keystrokes? When a keystroke-logging tool is installed on a shared computer, it can capture the passwords of every user who logs in. And now there’s a hack called Motion Leaks that uses your Smartwatch to track the keys you type remotely. How do you know someone isn’t watching? By using SOC-as-a-Service.
Even though the word App is relatively new, it has become popular in everyday terminology as its uses have changed lives in the modern world. Almost all mobile phones are now smartphones, so even those individuals who were apprehensive about using new technology now use apps on a daily basis. That is why we now […]
The Department of Homeland Security and the Federal Bureau of Investigation issued a critical alert Dec. 3, warning users about SamSam ransomware and providing details on what system vulnerabilities permit the pernicious product to be deployed. According to the alert, which came from the DHS’s National Cybersecurity and Communications Integration Center (NCCIC) along with the FBI, […]
What You May Not Know Alek Pirkhalo is the Co-Founder of Infiniwiz. He loves technology. Over the years he’s helped our team develop processes and resources to implement a systematic approach to IT management – an approach that proactively maintains and continuously improves our clients’ network environments. But there’s much more to know about Alek. […]