IT Consultants' Insight on Business Technology | NSK Inc.

Notorious Russian Hacker Caught & Arrested by FBI

Posted by Steven Lai Sun, Apr 30, 2017

 

A Notorious Russian hacker on the run for years, has finally been caught by the FBI.  The arrest was made during a vacation with has family in Spain.
  What is this Russian hacker known for?
Russian hacker ( Peter Levashov) is known for his huge cyber criminal activity. All of Peter's cyber criminal activity included draining other people's bank accounts and stock fraud. Furthermore, Peter Levashov is known for running a spam campign that included continuously sending emails that would advertise convincing counterfeit pharmaceuticals and remedies for erectile dysfunction.
Read More

Topics: cybersecurity

A new ransomware that deletes ALL of your backup files

Posted by Steven Lai Fri, Apr 21, 2017

You have a backup plan to store your files.. just in case your main device is hacked... You think you are safe.... Yet, now there is another type of attack, a cyber attack, called Samas Ransomware that can and will decimate all of your backup files, so are you truly safe?

 

Read More

Topics: Data Security, anti virus, cybersecurity

Singapore's Defense Ministry Hit With First Major Cyber Attack

Posted by Steven Lai Wed, Apr 19, 2017

 Singapore's government has been the latest victim of a cyber crime. There has been a hack in the internet access (I-net) of the agency which has led to the access of personal data.  Investigations revealed that basic personal data, comprised of NRIC numbers, telephone numbers, and dates of birth of around 850 servicemen and employees was stolen from I-net.

 

The I-net system is an internet access system used by national servicemen and MINDEFF employees to send emails communication and for their internet surfing. The system allows their employees to use terminals within the ministry premises and SAF's (Singapore's Armed Forces) camps.   

Read More

Topics: anti virus

SecureWorks finds & exposes phishing Russian hacker group APT28

Posted by Steven Lai Sat, Apr 08, 2017

 

A department from SecureWorks; a protective service unit that protects individual's or businesses digital information, has been closely watching a well known group of Russian hackers. 

Read More

Topics: Disaster Recovery, cybersecurity

What!? Congress wants you to Pay for online privacy?!

Posted by Steven Lai Fri, Apr 07, 2017

 

As a new policy that has been placed about precious information being collected from customers, it has caused negtaive reactions from online consumers.
Outrage sparked as the payment for online consumer privacy has been established after a vote down had been made by congress. Internet users will have to pay a "privacy tax" in order for them to protect their privacy.
 

Types of information being collected that caused the outrage?

 As the part of the rules is being established, broad brand providers will need to take "reasonable" steps to collect and protect customers information.  
Read More

Topics: cybersecurity

What is Data Mapping Software?

Posted by Robert Cordray Thu, Apr 06, 2017

Data mapping is typically the first step in integration of different data models. The process is used in data warehousing to link data sets according to specific data element definitions. The standards used depend on the domain values of the model used.

Read More

Topics: Data Security, data storage, data mapping

The top ten features the Android O update has to offer

Posted by Steven Lai Wed, Apr 05, 2017

On March, 21st, Google announced and released a preview version of the Android O.

Read More

Topics: New Technology

10 tips on how to avoid SMiShing (SMS phishing)

Posted by Steven Lai Tue, Apr 04, 2017

Mobile devices are used thousands of times every day by billions of people. Everyone now socializes through apps and text messages. Mobile devices are a great tool to connect with one or another, however privacy and cyber hackers  can be a risk factor to consider when thinking about Cyber Security.

Read More

Topics: cybersecurity, email security, SmiShing

Smishing?  What is Smishing?

Posted by Steven Lai Mon, Apr 03, 2017

 

 
Chinese hackers have set up a fake phone tower to send text messages to Android  mobile users. The text contains a brief text that states "Congratulations! you have won 100 GB internet pack". Along with the message within the text, includes an URL link that links mobile users to a virus.    

SMiShing

The title of this committed crime is called SMiShing. S M i S hing is all about tricking victims by sending out a malware app that links through text. The purpose of this crime is to trick individuals into giving out sensitive information by having them
Read More

Topics: cybersecurity, SmiShing, BostonIT

Sound waves can now be used to hack into mobile devices

Posted by Steven Lai Sun, Apr 02, 2017

 

Read More

Topics: Disaster Recovery