<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Pentagon Discloses Cyber Intrusion by Russian Hackers

Posted by Philip Tang on Fri, Apr 24, 2015

pentagonsecurity

Photo by Samuel Corum/Anadolu Agency/Getty Images
Read More

Topics: Data Security, cybersecurity

Tape Backup or Cloud Backup... Which One To Choose?

Posted by Cathie Briggette on Thu, Apr 23, 2015

With perpetual increased proficiency in cloud services (storage, file sharing, etc) I find it peculiar that, when it comes to backup recovery, some people and businesses alike are still hesitant to exploit one of the cloud’s greatest assets. Remember that ancient method of data backup and recovery, the one involving those rectangular pieces of plastic with that delicate magnetic strip? What were those things called again? Oh right, floppy disks. Do they even still make those? One of the longstanding debates when it comes to backup recovery is whether to use tape or disk backup; but the question I’m asking is, “Why use either?”

Read More

Topics: Cloud Computing, Disaster Recovery

All the different kinds of viruses and the antivirus protection against them

Posted by Cathie Briggette on Wed, Apr 22, 2015

People often consider the only threat against their computers to be a virus. This is a common misconception that often leads to detrimental system damage. A virus, in fact, is a specific threat that falls into the broad category of malicious software, or malware. Malware is used to disrupt computer operations, gather privileged information, and gain unauthorized access by hackers and frauds. Here are a few items that you might not know, but should learn to differentiate when it comes to malware.

Read More

Topics: Disaster Recovery

WikiLeaks Archives 2014 Sony Data Breach Contents

Posted by Philip Tang on Fri, Apr 17, 2015

WikiLeaks is determined to maintain the public status of the leaked Sony documents and emails

Julian Assange and WikiLeaks have decided to publish an archive of 200,000 confidential Sony emails and documents leaked by a data breach at the end of 2014.

Last November, Sony Pictures Entertainment (SPE) suffered a massive data breach at the hands of a hacker group calling themselves "Guardians of Peace." U.S. intelligence officials suspected the group to be linked to the North Korean government, but North Korea denied responsibility.  

Read More

Topics: Data Security

New Technology: Amazon Dash Buttons Usher in New Era of Convenience

Posted by Philip Tang on Fri, Apr 03, 2015

The Amazon Dash Button ushers in a new era of convenience

Laziness and convenience go hand in hand, but Amazon's latest creation has taken the former to extraordinary new heights. That in itself is an astonishing feat, considering how easy it is to order almost anything through a few mouse clicks - a sofa, TV, food, you name it. 

Read More

Topics: New Technology