Ransomware-Holding the Data on Your Computer Hostage
It’s a pretty nasty malware attack. Cryptolocker, also referred to as Ransomware, locks up the personal files on your computer, and in some instances, your backup files as well. It encrypts the data, and the ‘bad guys’ have the decryption key. The ransom – the hackers are charging their victims $300 for the decryption key.
In a brazen act, the criminals have launched a website, a CryptoLocker Decryption Service which allows victims to pay the ransom to get the decryption key to be able to regain access to their data. The hackers have a 72-hour deadline, and those...
Technical Troubles Plague the Affordable Care Act Website
The website for the Affordable Care Act, aka Obamacare, fell flat on the much anticipated Oct. 1, roll out. We’ve all been told that all the glitches will be fixed by Nov. 30.
I would urge caution on the promise to fix these issues in one month, considering that a 3-year development cycle led to such lack luster results. Throwing more resources at an issue doesn’t necessarily mean quicker or better results.
As the old adage of Brooks’s Law says, “just because it takes one woman nine months to make a baby, doesn’t mean nine women can do it in one,&r...
Responsible Use for the Cloud
Cloud technology allows people and businesses to access data from any Internet aware computer in the world. Aside from collaboration component, the cloud also provides huge storage capacity. The cloud is far cheaper than your business having to deploy its own server farm. Time to deploy a solution with an existing cloud service provider can be measured in weeks, versus the many months of building an in-house solution. The technologists needed to support a cloud solution are also far less expensive when part of a service provider’s solution.
While there are a lot of positives ...
A Social Networking Site That Respects Its Users
The Internet is not now, nor will it ever be, a bastion for data privacy. It’s why a certain degree of due care must be exercised when posting information online. Most popular social networking sites have privacy settings allowing users a certain amount of control over who can access their accounts.
Usually, no matter what setting you chose, the social networking site, or free email service provider are aggressively data mining anything you post or send via email. You would know this by the stream of adds popping up on your social networking page, or by the unsolicited emails clog...
|Tweets by @DataPrivacyNtwk|