Article

Utilizing Internal Social Networks

Date: 24 Sep 2010 | Posted BY: ulisticadmin

Many companies and businesses are maximizing the use of social networks and are now implementing internal versions for their company communications. And with the addition of these new platforms in a company, there is also a need to have the appropriate policies to manage them with. One of these purposes is the creation of internal social networks which, in a nutshell, improve communication and inf

Tabnabbing Exploits Vulnerabilities in Tabbed Browsing to Steal Passwords and Sensitive Information

Date: 23 Sep 2010 | Posted BY: ulisticadmin

Tabnabbing, a new phishing technique, poses new security threats to people who use tabbed browsing by changing the appearance of a tab to resemble a familiar website and prompts you to re-enter sensitive login information. Dubbed as “tabnabbing”, the vulnerability was discovered by Aza Raskin, the creative lead for the Mozilla’s Firefox browser and co-founder of Songza, a music

Spam Offering Protection Against a DDoS Attack Making Rounds

Date: 21 Sep 2010 | Posted BY: ulisticadmin

A new spam message is circulating, warning website owners of an attack unless they pay up, according to security firm Symantec. Security firm Symantec recently uncovered a scheme that purportedly attempts to extort money from website owners and operators in order to avoid the possibility of a DDoS attack. The capability of these extortionists to actually carry out the threat is still an open qu

Online Video Conferencing Made Easy with Three Cost-Effective Services

Date: 20 Sep 2010 | Posted BY: ulisticadmin

A look at Skype, Tokbox, and Oovoo, three online video conferencing services that offer new video conferencing services targeted for business. Many businesses these days are realizing the value of video conferencing and video chat. Not only do these tools eliminate transportation costs, they also drastically reduce unproductive time spent travelling. A simple phone call connects all parties instan

Users Warned Against Fake Antivirus

Date: 17 Sep 2010 | Posted BY: ulisticadmin

Fake antivirus software is spreading through a massive online campaign. Beware: a massive email campaign is underway to trick users into opening an HTML file attachment that redirects users to a hacked website containing links that further lure victims into launching a fake antivirus software package. According to security firm Sophos, the email messages are designed to trick people into paying to

Data Backups: Simple Way to Take Care of Your Data

Date: 16 Sep 2010 | Posted BY: ulisticadmin

For most business, the result of a sudden and immediate loss of data would be devastating. Yet data backups are probably one of the most neglected aspects of data management for many businesses. Let’s begin with a simple question: How important your data is to you? Think of all the information you have in your computers – all your databases, spreadsheets, documents, files, projects, emails, so

Mobile an Important Channel in the Future of Businesses

Date: 08 Sep 2010 | Posted BY: ulisticadmin

Survey of businesses reveals great interest in setting up mobile channels for customers. A new survey conducted by Adobe, a leader in software for the design and publishing industry, reveals great interest in emerging mobile channels among many businesses. Survey respondents from a wide variety of industries revealed an overwhelming preference for developing websites as their mobile commerce prese

Installing Uninterruptible Power Supply for Uninterrupted Productivity

Date: 07 Sep 2010 | Posted BY: ulisticadmin

An uninterruptible power supply (UPS) can help you save your work during power outages and keep your system safe from power surges. It’s an inexpensive piece of hardware every IT system should have. Keeping productivity going is important. The more productive your people are, the more work gets done and the more profit you make.  Every hour, and even every minute, of lost productivity costs

New Viruses Infiltrate Systems through USB Drives

Date: 06 Sep 2010 | Posted BY: ulisticadmin

Two new viruses have been discovered to infiltrate systems through removable drives. USB flash drives have become indispensable to almost everyone who uses a computer. It’s a quick and easy way to immediately transfer and share information and other data, especially files that are too large to send through email. Unfortunately, some malware take advantage of this convenience by attaching themsel

Social Engineering a Threat to Business Security

Date: 01 Sep 2010 | Posted BY: ulisticadmin

The security of your organization is not only threatened by malware, hacks, and network attacks, but also attacks via a technique called “social engineering”. Be aware that hackers have another tool in their toolset that employs a particularly subtle, insidious way of compromising the security of your systems and network. Called social engineering, it’s the use of psychological tricks to dec