Contact Us Today! 408-927-8700
facebooktwitterlinkedinRSS

NDYNAMICS Blog

This is some blog description about this site

Tip of the Week: Use This Security Checklist to Protect Your Network

b2ap3_thumbnail_security_checklist_400.jpgAs a business professional, you have a responsibility to ensure that your company’s network and data is protected from hacking attacks. It can be difficult to remember to take all of the necessary precautions, but with our help, you can easily outline all of the measures that should be taken to maximize security for corporate data.

Continue reading
0 Comment

LastPass Cloud Password Manager Hacked

On Monday, June 15, LastPass officials warned that attackers have compromised servers that run the company's password management service and made off with some master passwords of users of the LastPass service. You can read more detail about the attack here:  http://arstechnica.com/security/2015/06/hack-of-cloud-based-lastpass-exposes-encrypted-master-passwords and here: https://blog.lastpass.com/2015/06/lastpass-security-notice.html/ There's lots of jargon in those article about algorithms, encryption, hashes, anomalies, multifactor authentication, vault contents, SHA's and GPU's.  Enough to make your head spin!  Here's the bottom line: the passwords you store on ...
Continue reading
0 Comment

Where Hackers Go to Shop for Malware

b2ap3_thumbnail_black_market_hacker_400.jpgYou might recall how the Silk Road, an illegal online drug market, was recently shut down. Similar to the Silk Road, there’s another distributor of sensitive information out there; this one dealing with zero-day vulnerabilities. These types of cyber threats sell for top-dollar, and hackers are willing to pay in order to access your network.

Continue reading
0 Comment

Social Engineering: Not All Hackers Target Technology

b2ap3_thumbnail_social_engineering_risky_400.jpgThe nature of hacking is to take advantage of weak points and exploit them for some kind of profit. This is usually seen in flaws or vulnerabilities found within the code of a program or operating system, but these flaws can be psychological, too. Hackers are increasingly taking advantage of a concept known as “social engineering” to fool users into handing over sensitive information that can be used against them.

Continue reading
0 Comment

What Really Happens when Websites Collect Your Personal Data

b2ap3_thumbnail_entering_personal_data_online_400.jpgYou might be aware that some websites collect personal data from you depending on your mobile device’s location, your browsing history, and several other factors. This information is generally used for marketing, but it could have unforeseen effects on the way you browse the Internet. It can be fairly revealing about your personality, or possibly even incriminating. Therefore, you should be aware of how this personal information is gathered from you without you even knowing it.

Continue reading
0 Comment

Newsletter Sign Up

Powered by ChronoForms - ChronoEngine.com

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Upcoming Events

No events