Archive for November, 2015


Pay A Hacker Ransom Money And Risk Getting Bamboozled Twice

Posted November 30, 2015 by
Requesting a ransom from victims is an unfortunate trend gaining momentum in the hacking world. This is typically done using ransomware (where hackers encrypt data and request money for the key) and distributed denial of service attacks (where hackers threaten to overwhelm a system with traffic, thus knocking it offline). In both scenarios, hackers are…

Office Workers Still Prefer Using a Traditional Phone Over Mobile

Posted November 30, 2015 by
Take a moment to look at your desk telephone and contemplate its usefulness. When was the last time you used it for day-to-day operations? Do you even use it anymore, or do you rely on more recent communications solutions like Voice over Internet Protocol, and the smartphone? Some might argue that the telephone is an…

Microsoft Windows 10: 3 Settings You MUST Change After You Install

Posted November 23, 2015 by
There are a lot of differences and new features to Windows 10.  This is the most connected, most cloud aware and most “intrusive” version of Windows ever released.  While some experts believe that the built in features that get to know you to deliver a more personal experience are harmless and useful, others believe that…

How Fishing Nets May Be the Greatest Security Threat To The Internet [Video]

Posted November 23, 2015 by
Many countries around the world have access to the Internet, but have you stopped to consider how this service is deployed and connected to countries on different continents? Well, this is only made possible by the countless miles of wire laid beneath the surface of the ocean, all around the world. In fact, it’s somewhat…

Wearable Technology is Trending: Is This Good For The Workplace?

Posted November 20, 2015 by
You’ve probably seen the new fancy-schmancy watches that some people wear and wonder to yourself, “What’s so special about them?” Smartwatches like these are considered wearable technology and are typically meant to perform the various functions of a smartphone, minus the phone. Some devices are even used to monitor the body’s physical activity with health…

Every PC User Should Know NOT To Do These 3 Things

Posted November 18, 2015 by
Knowing how to properly use your PC is key to its longevity. Therefore, you should never take for granted basic PC best practices. Here are three basic PC best practices that are easy to overlook. Don’t Plug Your Computer Equipment Directly Into an Outlet While it’s likely that you plug a variety of your electronics…

New Version Of CryptoWall 4.0 Is Out And More Vicious Than Ever

Posted November 16, 2015 by
Reports are coming in across the Internet regarding a new version of the CryptoWall file ransom system.  This version not only encrypts victims data, but it also encrypts their files names as well, making it impossible to know what was lost unless backup logs are searched.  This ransom also holds users data locked until approximately…

Why You Shouldn’t Toss Your E-Waste In The Garbage

Posted November 16, 2015 by
Today’s society practices a policy of upgrading to brand-new devices whenever the next big thing drops. We see this all the time when businesses want to keep up with the latest trends by upgrading to new workstations that utilize recent operating systems, or because their old hardware feels slow. However, this can have a negative…

How A Nearby Hacker Can Access Your Phone Through Google Now And Siri

Posted November 16, 2015 by
These days, mobile exploits aren’t anything to be surprised about. Most people consider their smartphones to be more secure than their desktops or laptops, but the fact remains that there are just as many exploits, if not more, for mobile devices as there are for PCs. One of the latest mobile threats that can infiltrate…

4 Common Email Mistakes And How To Avoid Them

Posted November 11, 2015 by
Email is a staple in offices around the world, but many organizations are finding it easier than ever to make simple mistakes that can be easily avoided with proper training procedures. It’s a best practice to ensure that your team is adequately trained on how to efficiently use your chosen email client to its maximum…


Excalibur Technology
Excalibur Technology
Excalibur Technology
Excalibur Technology
Excalibur Technology
Excalibur Technology