BadUSB

BadUSB

Computer users normally pass around USB thumb drives much like silicon business cards these days and although we know they could carry malware and virus’ on these devices, we depend on antivirus scans and the occasional reformatting or deleting of these devices to keep our thumb drives from becoming the …..

00:00
55
00:00

Tech Talk On VOCM “The BASH Shellshock Bug”

Tech Talk on VOCM is a weekly tech spot highlighting the latest tech news and gadget reviews. On this episode The BASH Shellshock Bug is discussed. To listen, click on the PLAY button above.

The Bash Shellshock Bug

The Bash Shellshock Bug

“…as of last week, the technology world discovered a new security vulnerability known as the Bash Shellshock Bug, potentially much more serious than  Heartbleed…” This bug, which has actually gone un-noticed (we hope) for about a decade,  is found in a shell scripting command-line interpreter called BASH and it is used by …..

00:00
55
00:00

Tech Talk On VOCM – iCloud Security

Tech Talk on VOCM is a weekly tech spot highlighting the latest tech news and gadget reviews. On this episode iCloud security is discussed. To listen, click on the PLAY button above.

iCloud Security

iCloud Security

It looks like over the past week reports have now confirmed that certain high profile celeb’s iCloud accounts were compromised exposing private photos for the world to see. Apple’s iCloud platform (a service used to backup and sync all of your devices files and photos) was the target of this …..

Safer and Secure Surfing

Safer and Secure Surfing

Our online activities tend to leave a footprint that can be tracked because of the way the internet works and the way we interact with it. As you surf the web, your browser will register the sites you’ve visited by saving a history of the sites you have been to …..

Social Media Privacy

Social Media Privacy

Online privacy seems to be a cause for concern especially for anyone planning to use any of the social networking sites today. Popular sites like Facebook, Twitter, LinkedIn, and Instagram allow you to store your personal and private data with them while we trust it is in a safe and …..

Demystifying Malware

Demystifying Malware

What is Malware? For the most part, “Malware” is short for malicious software and is typically used as a catch-all term to refer to any software designed to steal your personal information, cause harm, or damage to a single computer, server, or computer network; whether it’s in the form of …..

00:00
55
00:00

Tech Talk On VOCM “Multi-factor Authentication”

Tech Talk on VOCM is a weekly tech spot highlighting the latest tech news and gadget reviews. On  this episode Multi-factor Authentication is discussed. To listen, click on the PLAY button above.

Multi-factor Authentication for Security Minded People

Multi-factor Authentication for Security Minded People

Well, we now live in a digital age where passwords are used for almost everythingand security breaches happen so often, you’re probably sick of hearing about them and changing your password. In most cases the news of a security breach does not reach the affected user for days, weeks, or …..

Internet Explorer Security Bug

Internet Explorer Security Bug

Well, for anyone that has not ensured their machine has done a windows update yet, this is proven to be a very serious vulnerability that allows for the silent remote control and installation of malware onto your PC. It is localized to people using Internet Explorer from versions 6 to …..

Archives

My Twitter Feed: