Browsed by
Author: Greg Swiecicki

45% of Employees Don’t Know How to Respond to Ransomware Attacks: Research

45% of Employees Don’t Know How to Respond to Ransomware Attacks: Research

The situation is still difficult, and research is showing that knowledge of ransomware is extremely general or none. As it turns out, yet 45% of respondents in North America, the USA, and Canada confirmed that they do not know how to respond to an attack.

https://www.cisomag.com/45-of-employees-dont-know-how-to-respond-to-ransomware-attacks-research/

Top 3 Ways Hackers Will Attack Your Network – And They Are Targeting You RIGHT NOW

Top 3 Ways Hackers Will Attack Your Network – And They Are Targeting You RIGHT NOW

I do not exaggerate, this problem is still there, and the problem is becoming more common and visible. Every day, small businesses are attacked by cybercriminals looking for vulnerable security points.

https://tmtdemo.axionthemes.com/2020/01/09/top-3-ways-hackers-will-attack-your-network-and-they-are-targeting-you-right-now/

Zoom Caught in Cybersecurity Debate — Here’s Everything You Need To Know

Zoom Caught in Cybersecurity Debate — Here’s Everything You Need To Know

The question is whether Zoom is malicious software? It is rather legal software in this situation used with high frequency. Using, for example, software for Zoom video conferences, yoga classes, and office meetings have exploded into a new form of communication. Only now are imperfections full of vulnerabilities coming out of the era of using Zoom.

https://thehackernews.com/2020/04/zoom-cybersecurity-hacking.html

How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera

How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera

Apple iPhone or MacBook users will not be delighted with the information that by visiting legitimate sites, they may unknowingly load a malicious ad; by using the Safari browser, the insidious attacker may have access to cameras, microphones or device location.

https://thehackernews.com/2020/04/hacking-iphone-macbook-camera.html

In the seventies, large-scale computer dominated, and the data was entered on perforated tape paper. In the early 1970s, Jacek Karpiński wanted to create a compact machine. Model K 202 did not occupy the whole room; it had a monitor and a compatible keyboard. The target was achieved. K 202 weighed 35 kilograms and cost 5 thousand dollars. The machine worked on a 16-bit processor and performed a million operations per second, which is 20 times more than modern Odra at that time.

https://lnkd.in/d9_prfV

It might seem that the K 202 and its inventor were facing a great future, the production of prototypes started in 1971. 15 out of 30 copies went to Great Britain; the rest was distributed to national institutions. Unfortunately, as a result of financial problems, K 202 never went into serial production, Jacek Karpiński was removed from work on the computer in general. It was said in those days that if Jacek was born in the USA, his ideas and invention could be the driving force of computer science. Unfortunately, he was born in a socialist Poland, where an understanding for scientists was not fully understood and financed.

https://en.wikipedia.org/wiki/K-202

Odra

Odra

Odra is the name of a series of computers manufactured at Zakłady Elektroniczne Elwro in Wrocław ODRA was a serial computer, that is, executing commands one by one, using a 38-bit word. Possibility of making 500 additions per second. Input/output devices were teletypes, card perforator, and card reader. Let see “a replica of Odra 1305 computer” : https://lnkd.in/dtd7isd One of the last copies of the Oder expired on July 18, 2003, after 29 years of trouble-free operation.

“World’s most secure online backup” provider exposes 135M records

“World’s most secure online backup” provider exposes 135M records

Disclosed online customer data is no longer the first case of “secure cloud backup.” If you are an SOS Online Backup customer, you should contact the company and find out about the breach and challenge security measures. Another violation of this type was disclosed in Canada in the Data Deposit Box, where 270,000 personal files were leaked.

https://www.hackread.com/worlds-most-secure-online-backup-provider-exposes-records/