Office365 users, rejoice! Microsoft’s policy of forcing users to change their passwords every 60 days is about to change…
Viewing entries tagged
A Twitter username, you might think, isn’t very important. If you can’t have the one you originally want, just stick a couple of underscores in and it’s more or less the same. The lengths that some people have gone to in order to get the name they want though suggests that Twitter usernames are more significant than they first appear.
When an employee leaves a company there is a lot of work to be done to ensure a smooth transition for whoever will take their place, however one of the procedures that is often overlooked is the reclaiming or wiping of company IT. There are plenty of reasons to have a firm company IT policy in place as there could be financial, logistical and privacy issues on the departure of an employee.
Cryptolocker is the vicious ransomware that is shutting PC users out of their personal files and charging them large fees in return for a passkey to access them again. The virus has spread quickly over the past year and the estimated figures of infected units have been revealed by Dell Secureworks.
In one of our posts on internet security, we covered the increasing threat of a new type of ransomware called Cryptolocker. The malware, when installed on a user’s computer, encrypts their files and then demands payment to decrypt them. The user is presented with a timer that counts down and an ominous message explaining that if payment isn’t received before the timer reaches zero, all of the files will be destroyed with no chance of them ever being recovered.
Apple’s smartphone selection is about to receive a shake up as two new models will be added to their lineup and production of the iPhone 5 will stop altogether. The long rumoured iPhone 5c was unveiled last week alongside another new Apple handset, the iPhone 5s, providing customers with a top, mid and low end option. While many predicted the arrival of the 5s and 5c, there were one or two raised eyebrows at some of the announcements.
A couple of months ago, our very own Jason Ede wrote a great article on password security and just how easy it is for hackers to gain access to personal information. By gaining access to hash databases and using software such as popular hacking tool “Hashcat”, it becomes a matter of time before hundreds of passwords are decoded. A new modification to the popular software has vastly improved its cracking capabilities, leaving a lot of people vulnerable to attack.