Still using XP? Might be Time to Plan for an Upgrade

Date: 03 Aug 2011 | Posted BY: ulisticadmin

It is inevitable to have to upgrade any kind of software sooner or later. This is now true for Windows XP, as Microsoft has announced a discontinuation of support for the operating system in 2014. Microsoft recommends upgrading to the newer Windows 7 OS, which is something worth considering as early as now. Part of using any sort of software is the inevitable need to upgrade. Most if not all soft

$63,000 Lost in Online Banking Attack

Date: 24 May 2011 | Posted BY: ulisticadmin

Many SMBs are unaware that hackers are finding online banking transactions to be profitable and easy targets for cyber-attacks because of several weaknesses in the security systems not only of both organizations, but also in the authentication protocols between them. In a recent attack, cyber-thieves managed to get away with $63,000 after they exploited vulnerabilities in the online payroll system

Research Initiatives in Internet Security Promise a Safer Web Experience

Date: 13 Apr 2011 | Posted BY: ulisticadmin

Internet security is an issue not to be taken lightly. As an increasing number of businesses use the web for more efficient operations, there is also more risk of being affected by malware and viruses. But thanks to initiatives such as WebBlaze and BitBlaze from Professor Dawn Song, developers are better equipped to make more effective IT security systems. If you think hackers are the only ones d

Is Unfriending Good for Your Business?

Date: 13 Jan 2011 | Posted BY: ulisticadmin

One thing is clear, quality is still more important than quantity. Especially with the current economic downturn, people are downsize everything – including online social circles. November 17, 2010 was declared by Jimmy Kimmel during his television show as “National Unfriend Day”, the opportunity for all Facebook users to declutter their Facebook pages by “unfriending” people in their f

Public Wi-Fi Networks Pose Security Risks

Date: 31 Dec 2010 | Posted BY: ulisticadmin

These days, more and more people are on the go, and many of them bring their work with them. While connecting to public and open-access Wi-Fi hotspots is indeed convenient, using open networks also pose risks that endanger your security. While connecting to public and open-access Wi-Fi hotspots is indeed convenient, using open networks also poses risks that endanger your security. The open nature

Your Copy Machine: A Serious Security Risk?

Date: 21 May 2010 | Posted BY: ulisticadmin

It seems that even the most innocuous machines in the workplace can serve as a security threat to companies. According to this report from CBS News, many office copiers save the images they copy on a dedicated hard disk installed inside them. This means that everything from mundane memos to your most sensitive information such as financial statements and contracts are stored – and could potentia

Beware of Ransomware!

Date: 26 Mar 2010 | Posted BY: ulisticadmin

Users beware of ransomware: malicious software that extorts money from users in exchange for freeing the user’s computer or data. One particularly nasty version was recently discovered by researchers at CA which came bundled with a software download called uFast Download Manager. The malware blocks Internet access for users until they pay the publisher a fee via SMS. Users who download the softw

Mariposa Botnet Masters Arrested

Date: 15 Mar 2010 | Posted BY: ulisticadmin

Spanish authorities report that they have arrested the masterminds behind a string of online criminal activities using the botnet dubbed Mariposa. Mariposa is the original name of a commercially distributed Do-it-Yourself malware kit, sold online for 800/1000 EUR for “wannabe” hackers.  Along with the arrest, authorities seized sensitive data belonging to about 800,000 users in 190 countries

Beware of Vulnerabilities in Windows and Office

Date: 26 Feb 2010 | Posted BY: ulisticadmin

Microsoft recently released a number of security bulletins and patches addressing vulnerabilities in Windows and Office that are of high risk to users. It’s widely believed that many will be exploited by hackers within the next 30 days. One of them could potentially allow hackers or malware authors to easily compromise systems by tricking users to download malicious AVI-formatted files. Others r

Beware the Kneber Botnet

Date: 25 Feb 2010 | Posted BY: ulisticadmin

A malicious piece of software making the rounds of news websites this week is believed to be behind the compromise of over 75,000 systems in over 2,500 international organizations – many of which are government agencies and large Fortune 500 companies. Called the Knebner botnet after the name in the email used to register the initial domain used in the campaign to propagate the malware,