search slide
search slide
pages bottom
Currently Browsing: Results for Tag "Cybersecurity"

Hands-on review: Acronis True Image 2017 New Generation - features abound

Hands-on review: Acronis True Image 2017 New Generation - features abound This backup software has military grade protection, tons of customisation, a smooth UI, and many other tools and features.You can use Acronis Asign to digitally capture signatures and generate a unique certificate that contains signatures, timestamps, and other information.

Twitter versus trolls: Are they doing enough?

Twitter versus trolls: Are they doing enough? As a result, Twitter seems to have entered into an arms race with the trolls.On Tuesday, they launched their latest salvo consisting of three new lines of defense: stopping the creation of new abusive accounts, bringing forward safer search results, and collapsing potentially abusive or low-quality Tweets.

At it again: Scammers targeting Kiwi elderly

At it again: Scammers targeting Kiwi elderly The New Zealand Police are warning the public about a phone scam targeting elderly residents to dupe them into giving out their personal information.The scam was first reported by the Bankers Association on 2 February 2017, where scammers were posing as workers from utility companies and banks.

Tackling NZ cybercrime in 2017: Why revery is just as important as prevention

Tackling NZ cybercrime in 2017: Why revery is just as important as prevention Every year, businesses across New Zealand are hit by some sort of virtual attack.With big money to be made from hacking into a company's database and stealing sensitive information, scammers are now attempting to dupe the hackers.

InternetNZ welmes govt's Tel Act Review

InternetNZ welmes govt's Tel Act Review The organisation says it is particularly pleased with the focus on fibre broadband.We think it will deliver the fair broadband prices Kiwis deserve," explains Jordan Carter, InternetNZ chief executive.

Rugged mobility: Take your PC anywhere you need it – without fear

Rugged mobility: Take your PC anywhere you need it – without fear As we become an increasingly mobile workforce, demand for devices that can accompany us anywhere has soared.This is where Durabooks have excelled, offering innovative laptops and tablets with rugged features that while offering the same convenience and features as a consumer laptop, are also capable of surviving in harsh working conditions.

Online daters beware: Valentine's Day scammers in full swing

Online daters beware: Valentine's Day scammers in full swing “Every year we see a spike in online dating activity around Valentine’s Day,” he says.” For those of you frequenting these online spaces in the lead up to tomorrow, Fitzgerald says there are ways to stay safe and to avoid trouble.

NordVPN's top tips to help you stay savvy about your internet privacy

NordVPN's top tips to help you stay savvy about your internet privacy But a new study from iSchool says most users aren’t even aware that their private data is being told to advertising networks and third party providers which deliver targeted ads, NordVPN says.“Or, worse yet, a woman who has suffered the trauma of miscarriage is often still persecuted by pregnancy ads, following her from once-visited pregnancy sites,” NordVPN says.

Flying a drone at work? Now there's insurance specially made for mmercial UAVs

Flying a drone at work? Now there's insurance specially made for mmercial UAVs With the commercial UAV industry set to hit $127 billion globally in areas as vast as media, film, surveying, real estate and logistics, back home the rules and regulations around insurance and risks have been ‘patchy’, says Delta Insurance.There are no legal requirements for UAV operators to hold insurance, and current insurance solutions don’t cover risks that operators face.

MOTAT honours Kiwi innovators with latest exhibition

MOTAT honours Kiwi innovators with latest exhibition The Innovators is a showcase of some of New Zealand’s most prominent innovators now open at Auckland’s Museum of Transport and Technology (MOTAT).It is an exhibition which celebrates the entire process of innovation, from conceptualisation to creation and explores the learnings from setbacks overcome along the way.

Bad experiences for almost 70 percent of Kiwi online daters - tips for success

Bad experiences for almost 70 percent of Kiwi online daters - tips for success If you’re planning to find your Mr or Mrs Right online, then it would pay to take note of the New Zealand Norton Online Dating Survey first.In fact, 55 percent of respondents are spending at least an hour a day on online dating sites, with 53 percent of users finding it difficult to identify scammers.

Microsoft bolsters global fight against cybercrime with new facility in Mexico

Microsoft bolsters global fight against cybercrime with new facility in Mexico Not all heroes wear capes — in fact, some of them wear glasses and sit on the IT team at Microsoft.On Friday, the technology company announced the launch of a new Cybersecurity Engagement Center in Mexico as part of its global initiative to bolster IT security.

NMIT launches postgrad diploma to boost NZ's cybersecurity skills

NMIT launches postgrad diploma to boost NZ's cybersecurity skills The Nelson-Marlborough Institute of Technology (NMIT) is the latest institution to deliver cybersecurity training to IT staff, with the launch of its new postgraduate diploma programme.The NMIT Post-Graduate Diploma in IT Security Management is being offered in the institute’s Auckland campus to domestic and international students.

This is why you should be terrified of the Wikileaks Vault 7 data dump

This is why you should be terrified of the Wikileaks Vault 7 data dump If it has a chip, an operating system, power and is connected to the internet, it fits the profile.As a spy agency, CIA’s job is to spy on those outside the U.

One perfume wants to be the next weapon against cybersecurity attacks

One perfume wants to be the next weapon against cybersecurity attacks The company is partnered with Scarlett London, a well-known fashion and lifestyle blogger based in the U.Together, they have created a dialogue around the importance of cybersecurity and just how devastating a cyberattack can be for those who are not properly protected.

In defense of Kellyanne Conway's astonishingly stupid microwave comment

In defense of Kellyanne Conway's astonishingly stupid microwave comment Over the weekend, Kellyanne Conway talked some nonsense about microwaves.It was only a week ago when WikiLeaks dumped a trove of unverified documents that (among other things) alleged that the CIA could spy on people through their Samsung smart TVs.

Russian spies blamed for massive Yahoo! hack

Russian spies blamed for massive Yahoo! hack This time the focus is on the massive 2014 hack of Yahoo!According to the Washington Post, Russian intelligence members hired two hackers to help them with the Yahoo!

Hackers attempt to extort Apple for $75k

Hackers attempt to extort Apple for $75k A group of hackers calling themselves the ‘Turkish Crime Family’ claim to have access to a large number of Apple email accounts and are holding them ransom for $75,000 in Bitcoin or Ethereum.” David Dufour, senior director of engineering & cyber security at Webroot suggests Apple users err on the side of caution.

If you use Minecraft mods, do your research first

If you use Minecraft mods, do your research first ​Minecraft fans beware: IT security company ESET have discovered 87 malicious apps disguised as mods for Minecraft with close to a total of one million downloads on the android store.This means that 990,000 Android mobile users have been unknowingly exposed to malicious content as well as ad and scam content by installing these fake Minecraft mods.

How your car might be protected from hackers in the future

How your car might be protected from hackers in the future Two senators are trying to defend your future cars from hacks.Ed Markey and Richard Blumenthal (of Massachusetts and Connecticut, respectively) recently reintroduced the SPY Car Act, which aims to protect the control of your vehicle as well as any data a hacker might find there.