How to protect Windows 10 PCs from ransomware

Credit to Author: Preston Gralla| Date: Wed, 10 Jan 2018 03:00:00 -0800

CryptoLocker. WannaCry. Petya. Bad Rabbit. The ransomware threat isn’t going away anytime soon; the news brings constant reports of new waves of this pernicious type of malware washing across the world. It’s popular in large part because of the immediate financial payoff for attackers: It works by encrypting the files on your hard disk, then demands that you pay a ransom, frequently in Bitcoins, to decrypt them.

To read this article in full, please click here

(Insider Story)

Read more

(Insider Story)

Read more

5 more Windows admin tasks made easy with PowerShell

Credit to Author: Jonathan Hassell| Date: Wed, 13 Dec 2017 03:00:00 -0800

I’ve written a lot about Microsoft PowerShell on this site, but my favorite thing to do is show how to apply the scripting language to various tasks you already have to do as part of your regular role and responsibilities. In a previous article, I demonstrated how to accomplish five common administrative tasks using PowerShell.

To read this article in full, please click here

(Insider Story)

Read more

The top 5 problems with blockchain

Credit to Author: Lucas Mearian| Date: Fri, 10 Nov 2017 03:11:00 -0800

While blockchain appears ready to upend business processes and trust models across a myriad of industries, it’s still in its early days and the various iterations of the distributed ledger already in use are far from vetted.

To read this article in full, please click here

(Insider Story)

Read more

Anatomy of a spambot

Credit to Author: John Brandon| Date: Thu, 19 Oct 2017 03:00:00 -0700

For security pros, spambots are known enemies. For the uninitiated, they are unknown entities. And yet they proliferate like ants at a picnic or teens on messaging apps. You might be receiving countless messages from bots every day, and even worse, a bot might be sending out unwanted emails from your computer right now, making you an unwilling participant in digitized mayhem.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

What Face ID means for iOS and device access

Credit to Author: Ryan Faas| Date: Fri, 29 Sep 2017 03:11:00 -0700

The most obvious difference between the upcoming iPhone X and every iOS device that preceded it is the loss of the iconic Home button. For years, it has served as the fingerprint sensor for Apple’s Touch ID technology, offering easy and secure unlocking of the device as well as authentication for transactions.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

Windows Hello for Business: Next-gen authentication for Windows shops

Credit to Author: Jonathan Hassell| Date: Wed, 13 Sep 2017 04:01:00 -0700

Authentication: the act of proving one’s identity to the satisfaction of some central authority. To most, this process means typing in a username and a password. It’s been this way for years and years.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

Q&A: AppDynamics CIO sees SaaS as the future of mobile management

Credit to Author: Lucas Mearian| Date: Wed, 21 Jun 2017 03:11:00 -0700

Application performance management (APM) software provider AppDynamics knows the value of a good SaaS platform, both in terms of offering workers the tools they need while keeping control over access to corporate apps and data.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more