Thursday , 13 December 2018
Home 4 IT

IT

How attackers can exploit iTunes Wi-Fi

itunes wi-fi sync feature mobile device ios device

An iOS feature called iTunes Wi-Fi sync, which allows a user to manage their iOS device without physically connecting it to their computer, could be exploited by attackers to gain lasting control over the device and extract sensitive information from it. The vulnerability was discovered by Symantec researchers, disclosed to Apple and now to the RSA Conference 2018 attendees and the wider public. Apple has implemented a mechanism that should prevent easy exploitation of the feature, but the researchers say that it doesn’t address the “Trustjacking” problem in an holistic manner. When users connect their iOS device to a computer or, for example, a free charger at an airport, they are asked whether they will trust the computer (meaning, that its settings and data will be accessible from it when connected). Most users believe that they have to trust the computer to get their device charged and believe the trust/access works only …

Read More »

What is social engineering?

Social Engineering

Social Engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Phishing, spear phishing, and CEO Fraud are all examples. Top 10 Techniques Used By Social Engineers Understanding the different attack vectors for this type of crime is key when it comes to prevention. This is how the bad guys do it:  Pretexting An invented scenario is used to engage a potential victim to try and increase the chance that the victim will bite. It’s a false motive usually involving some real knowledge of the victim (e.g. date of birth, Social Security number, etc.) in an attempt to get even more information.  Diversion Theft A ‘con’ exercised by professional thieves, usually targeted at a transport or courier company. The objective is to trick the company into making the …

Read More »

Can smart cities really save us all

smart cities

Smart cities, and the components which comprise them, will save us all time – and a new study puts the total at 125 hours per citizen per year. The study, put together by Intel alongside Juniper Research, found that 125 hours, or 15 working days, will be claimed in four buckets. Mobility, such as smart traffic systems, smart parking, and ‘open data platforms’ – so users can pick the least congested bus and train services – will account for 60 hours. Greater public safety – predicting crime spots through machine learning – will account for 35, while healthcare comprises nine and productivity – digital services simplifying administrative processes – will account for 21. What could inhabitants of smart cities do with all that free time, the report asks? They could take a long holiday, get active, or spend it with family and friends. What’s more, wounds will heal quicker – …

Read More »

12 Ways to Increase Hotel Security

Even when hotels have strong security policies and procedures in place, they are still vulnerable to cyber attacks, break-ins, theft, fraud, and other crimes. That’s why it’s vital to take precautionary measures and continually evaluate security programs. “Having robust security in place means a better, safer, guest experience,” says Chad Callaghan, principal of Premises Liability Experts and AH&LA security consultant. “When department managers and other employees think more about safety and security, you can prevent a lot of theft and minimize dangers.” Inadequate security has repercussions beyond guests losing belongings to theft. Hotels can be held liable for the criminal acts of third parties. Civil litigation against property owners and managers has become commonplace ever since Garzilli v. Howard Johnson. And hotels are still targets of lawsuits because of theft and injury. Before becoming AH&LA’s security consultant, Callaghan spent 35 years with Marriott International. As the vice president of global …

Read More »

Don’t overlook your monitor

For some, the term “tech innovation” brings to mind new PC form factors and unique printing methods. But high-tech innovation doesn’t stop at hardware—it also includes displays. In recent years, display innovation has produced heightened resolution, connectivity, functionality, and ROI. Displays are sleek, stylish, more robust, and thoughtfully aligned with today’s dynamic, agile, and collaborative work spaces. Designed to drive work teams, the latest iterations of this oft-overlooked, but critical technology can boost your performance, productivity, and efficiency. Source : https://h41369.www4.hp.com/taw/article/ID/GB/TAW_001219?hprpt_id=TAW_001219

Read More »

Free speed boost your PC

Why does a window slow down with age? There are many reasons, not least of which is that over time it has to cope with the demands of more and more installed programs, each new program you install take up space on the hard disk, user memory and may use space to create files and documents. Some programs such as antivirus tools start when windows lads and each of these uses a share of the PC’s available memory, hard disk space and processor resources. They can also make windows take forever to start by jostling for position and trying to load while windows itself is trying to get its house in order. If there are lots of programs running, eventually there comes a time when memory runs low and windows has resort to using free hard disk space as extra virtual memory, this is much slower than real memory and …

Read More »