Give us a call

Ferrum Technology Services Blog

Ferrum Technology Services has been serving the Elgin area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Want to Keep You in the Dark

b2ap3_thumbnail_hackers_want_to_take_everything_400.jpgWhen it comes to hackers, they are shrouded in darkness and treachery. They lurk in the shadows, waiting for us to make a mistake and to steal our life savings, or other equally nefarious things. But there are a few assumptions that they make concerning their prey, and they wish to hide these from us at all costs.

0 Comments

Alert: Cryptolocker Threat Returns with a Vengeance!

b2ap3_thumbnail_warning_malware_400.jpgTwo weeks ago, the National Communications Administration managed to weaken a set of malware designed to steal banking and personal credentials from unsuspecting users. They warned the world that GameOver Zeus and Cryptolocker ransomware would be back with a vengeance, and that immediate action could prevent a whole lot of pain later.

0 Comments

Warning: New Botnet Threat Could Spell GameOver, Literally

b2ap3_thumbnail_gameover_botnet_400.jpgLook out, users of Windows; the Greek god of thunder is angry, and he's sent the Zeus family of malware out into the world. The one in question, GameOver Zeus, is particularly nasty. Thankfully, the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice managed to find a way to disrupt it, but that doesn't mean that GameOver Zeus is out of the game - in two weeks, the threat will return with a vengeance.

0 Comments

Protect Your Little Bundle of Joy, Before You Get a Bundle of Terror Instead!

b2ap3_thumbnail_protect_your_family_400.jpgToday's home has all sorts of conveniences when it comes to security and wireless devices, such as mobile-controlled security systems, temperature gauges, and light switches. These devices can also be connected to the Internet for ease of access. You think it's safe behind passwords, firewalls, and security applications, but you're wrong. Anything that's connected is at risk - even baby monitors.

0 Comments

For Hackers, Microsoft Security Patches are Roadmaps to Access Your Data

b2ap3_thumbnail_windows_eight_point_one_400.jpgLately, there's been a string of computer security issues making the news, like the vulnerability found within Internet Explorer, the Heartbleed bug, and the host of issues associated with the recently-expired Windows XP. Is it possible that the security patches issued by Microsoft are making the problem worse for users of older systems like Windows XP?

0 Comments

Alert: Siri’s Leaking Secrets - iPhone Lock Screen Vulnerability

b2ap3_thumbnail_ios_vuln_400.jpgApple's iOS 7.1.1. operating system has been affected by a series of bugs throughout this month. The first bug was emails being sent unencrypted, but now a new threat lurks in the shadows - a lock screen flaw that allows hackers to access your contacts list without unlocking the phone.

0 Comments

Is Microsoft Ending Support for Windows 8.1?

b2ap3_thumbnail_win_8_one_update_400.jpgIn an interesting twist to the Microsoft OS saga, Microsoft announced that it will cease providing security updates for Windows 8.1 unless users upgrade the software to Windows 8.1 Update (the newest Microsoft OS update). What's Microsoft's reasoning behind this verdict?

0 Comments

4 Tips to Keep the Phish From Biting

b2ap3_thumbnail_phishing_400.jpgJust like the dark waters of the benthic ocean trenches, the Internet is filled with wondrous creatures that have never been seen before. However, there are also rather ugly things lurking in the depths as well. No matter how deep you swim, there are always the deep sea phishermen that will try to rip you away from everything you hold dear – your personal and professional data.

0 Comments

Cyber Punks – Why We Can’t Have Nice Things

b2ap3_thumbnail_security_from_threats_400.jpgIn high school, there were always the rebellious kids who never wanted to do what their teachers said. They would vandalize the bathroom stalls, walk around the halls without permission, skip classes, and make the school an overall unpleasant environment. The teachers eventually decided that enough was enough, and they banned certain privileges that the students had. Bathroom breaks became timed. Hall monitors stalked the halls looking for troublemakers. Our liberty was stolen by these hooligans.

0 Comments

WARNING: Huge Vulnerability in Internet Explorer Affects Everybody, No Fix for XP

b2ap3_thumbnail_alert_red_400.jpgAlert! Those using Windows Internet Explorer as your preferred web browser might want to take a short break from it and consider using a different browser like Chrome or Firefox until Microsoft works out a recently-discovered vulnerability.

0 Comments

The Heartbleed Aftermath

b2ap3_thumbnail_heartbleed_aftermath_400.jpgThe Heartbleed bug, one of the nastiest deficiencies in Internet security to date, was found last week. More than two-thirds of the Internet's secure information could have been leaked from websites utilizing the OpenSSL cryptographic library's encryption style. Most major websites have already issued a patch to resolve the problem, but that doesn't change the fact that this information has been available to anyone looking for it for over two years. Worse still is that you would have no idea how to tell whether your data has been compromised.

0 Comments

Warning: Heartbleed Bug Assails the Web

b2ap3_thumbnail_heart_bleed_two_400.jpgThe same day that Microsoft ceased supporting Windows XP with security patches was also the day a vicious little monster was discovered – the Heartbleed bug, which renders privacy in the OpenSSL cryptographic library completely obsolete. Basically, anything utilizing the OpenSSL open source library is at risk here. Websites utilizing this form of encryption include Yahoo! Google, and Facebook. To put it in perspective, sites that utilize OpenSSL number more than two-thirds of the entire worldwide web. Though this bug only applies to versions 1.0.1 and 1.0.2 beta of OpenSSL, hackers are able to obtain private keys which can be used to obtain sensitive information from countless people all around the world. Nothing says "heartbreak" like having your identity stolen and your sensitive data Shanghaied.

0 Comments

It Doesn’t Make Sense to Be Anti-Antivirus

b2ap3_thumbnail_antivirus_solutions_400.jpgThe Internet has grown to such a vast size that it in itself is like a world within a world. Some people live on it, and share their secrets far too openly. These people think themselves safe in a world that technically doesn't exist, but there is a lot more danger involved with the Internet than some people realize. There are criminals everywhere, and they are just waiting for you to drop your guard long enough to swipe everything you've worked so hard to protect.

0 Comments

What to Do When Your Smartphone Gets Stolen

b2ap3_thumbnail_lost_my_phone_400.jpgAs with anything else that's deliberately taken from you, having your smartphone stolen can be one of the most frustrating experiences ever. After all, many of us use them to keep us on point with our daily tasks. Measures are being taken by legislators and cell phone companies to help curb the issue, but there are ways that you can prevent and react to your phone being stolen.

0 Comments

200 Million People’s Identities Compromised in One Scam

b2ap3_thumbnail_it_security_400.jpgDetails are still coming in regarding one of the biggest data breaches in history that compromised the personal records of 200 million Americans! The scam was propagated by the online ID theft service Superget.info, and it's currently being investigated by the U.S. Senate Committee on Commerce, Science, and Transportation.

0 Comments

Data Protection is Still Important, No Matter What We Write

b2ap3_thumbnail_mobile_data_security_400.jpgPrior to the XXII Olympic Games in Sochi, Russia, concerns were shared from many American news outlets in regards to mobile data security. On the eve of competition the NBC Nightly News with Brian Williams broadcasted a story suggesting that data security in Russia, and more specifically, at the Olympic games was atrocious; with the reporter, Richard Engel, getting both his smartphone and his work laptop hacked almost immediately.

0 Comments

Be Wary of Free Wi-Fi

securephone400When browsing the Internet on your smartphone, you know how to be on the lookout for scams that will disable your device with viruses; but did you know that you also need to be careful which Internet connection you use? By connecting to the wrong Wi-Fi signal, you could be falling for a scam.

0 Comments

Hackers Go for the Gold at the Sochi Winter Olympics

b2ap3_thumbnail_sochi_winter_olympics_400.jpgIn Sochi, Russia, the world's best athletes aren't the only ones having spent years preparing for the Winter Olympics. Russian hackers have also readied themselves for the world's arrival. Hackers have tapped every public WiFi network in the vicinity of the games. We can learn a thing or two about the WiFi problems in Sochi.

0 Comments

Today’s Network Security is about Controlling Information

netseccloud400The modern IT landscape is dramatically changing from a model where an IT department controls everything, to companies outsourcing their IT services. This paradigm shift challenges older ideas about traditional network security equating ownership and control with strong security. Does your business view IT outsourcing as a security help or a hindrance?

0 Comments

Don’t Underestimate the Black Market Value of Your Email

b2ap3_thumbnail_email_value_400.jpgDue to the many different forms of digital communication, you may check your email less than ever before. However, just because you may not use your email account very often, it doesn't mean that a hacker will leave it alone. Every email account is full of valuable information and should be protected with the strongest security measures available.

0 Comments

Blog Archive

2012
January
February
March
April
May
June
July
August
September
October
November
December
2011
January
February
March
April
May
June
July
August
September
October
November
December
2010
January
February
March
April
May
June
July
August
September
October
November
December
2009
January
February
March
April
May
June
July
August
September
October
November
December
2008
January
February
March
April
May
June
July
August
September
October
November
December
2007
January
February
March
April
May
June
July
August
September
October
November
December

Mobile? Grab this Article

QR Code

Contact us

Learn more about what Ferrum Technology Services can do for your business.