ProtectedComput's profile picture. We curate the cyber protection channel at http://thingscyber.com Pls tell us your tips for protecting your digital life.

ProtectedComputer

@ProtectedComput

We curate the cyber protection channel at http://thingscyber.com Pls tell us your tips for protecting your digital life.

Altered Carbon: Exploring concepts of life, death and the bio-sciences - We can’t wait for Altered Carbon. Will be a great series with lots of interesting and thought provoking questions. Like, what will happen if people can avoid death? Get some insi... ow.ly/7Y9X50glaNL


ProtectedComputer reposted

Thank you so much for the very kind words! We are on the side of the small to mid-sized business!

Best of 2017 #SmallBiz Blogs: Offering meaningful context & advice to all kinds of IT leaders, @CTOvision is a must-read! tech.mg/lz9yTa



ProtectedComputer reposted

Another very kind award. Thank you @vertitechit for putting us on this list with so many great publications. Makes us want to work harder!


#security Security Experts: Why Smart Home Devices Should Scare You - Despite the light tone, all the experts found it difficult to say many positive things about the current state of connected devices.”Imagine if you took computing back in the ’80s a... ow.ly/EXVL50ggspL


#security Update your Google Chrome browser to Chrome 64 for Meltdown And Spectre Security Patches, Site-Wide Auto-Mute, Improved Popup Blocker - For past week or so we have been hearing about the twin CPU flaws called Meltdown and Spectre. Google had... ow.ly/rUTw50ggmhi


#security Security flaw in Prime Exclusive Moto G5 allows access to anyone - If you bought your Moto G5 Android smartphone from Amazon Prime, you need to worry. There’s no doubt in many people’s minds that the Amazon Prime exclusive version of certain... ow.ly/azw550ggePh


#security Best 5 ways you can protect yourself from phishing attacks - Phishing forms one of the biggest attack vectors for cybercriminals as it is easy to fool users by sending an unsuspecting link through email posing as your friend. It’s a widespre... ow.ly/z8pc50gga3R


#security Can Internet of Things make your physical security better? - The Internet of Things arrived somewhere in 2015 and the possibilities offered by it are seemingly endless. Imagine a world where everything is interconnected and helps you in your... ow.ly/L86L50gfyDg


#security The world’s most secure smartphones — and why they’re all Androids - Smartphones may be our most personal devices — we carry them everywhere, and they know more about our lives than our closest friends — but they were never designed with sec... ow.ly/MYLh50gfqxM


#security Why installing Chrome and Firefox extensions can be deadly? - A majority of users use either Google’s Chrome or Mozilla’s Firefox browsers to surf the Internet. The beautiful thing about Chrome and Firefox is the ability to install service-s... ow.ly/GuSp50gflCW


#security Third Party Risks To Enterprise In A Post Equifax World - In the aftermath of the Equifax breach in which millions of people’s Personally Identifiable Information (PII) was stolen, everyone from press to the Senate has been focused on the cu... ow.ly/7EhE50gfhzB


#security What is Ransomware and how to protect your PC/laptop against ransomware attacks? - Since 2010, ransomware has evolved as one of the biggest cyber risks. In fact, 2017 saw more ransomware attacks than ever before. May 12th 2017 saw the bigges... ow.ly/MHPG50geQtp


#security 2017: The Year of Email Data Breaches - Ever since its introduction, email has become the defacto means of communication for every individual and businesses. The email gives us instant communication options unlike the snail mail of old days.... ow.ly/FOfU50geJGI


#security What is web server security and why is it important? - These days everything is online. Internet-less or air-gapped PC/laptops and devices either belong to medieval past or military installations. Everything needs Internet – you smartphone w... ow.ly/ys8x50geCtv


#security Hackers steal almost $400M from cryptocurrency ICOs - According to a new research report (.PDF) by Ernst & Young, over 10 percent of all funds changing hands during these events have been lost or stolen. This equates to roughly $400 million ... ow.ly/ylEB50gexe1


#security How to keep you iPhone safe and secure! - Once you’re more familiar with the iPhone, you may want to take some time to review and customize your device’s settings. Settings control everything from the way your iPhone works to the data it sha... ow.ly/nOxc50gdUZm


#security Why securing your web browser against cyber attacks is important - Hacking, data breach, phishing, social engineering – ultimately everything boils down to how safe your web browser is. You may be using Google Chrome, Mozilla Firefox, Apple ... ow.ly/FJ5250gdNkE


#security Satori Botnet Malware Now Can Infect Even More IoT Devices - The authors of the Satori IoT malware family have dramatically increased their pool of bot recruits for attack botnets with a new version of the tool targeting systems running ARC ... ow.ly/4HLW50gdIl6


#security Samsung brings Knox security to smart fridges and TVs - Samsung’s Knox security is no longer limited to running on phones and tablets. The company has announced that it’s integrating Knox across its connected devices, including TVs, applianc... ow.ly/SKy550gdcGS


#security Own a Mac, Windows PC or a smartphone? You need to update now! - Apple says all of its Macs, iPhones, and iPads contain a security flaw that requires an update. It’s not alone. Any owner of a PC, tablet or smartphone should make sure that au... ow.ly/O6yA50gd6dA


Loading...

Something went wrong.


Something went wrong.