Ransomware Was Back In The News This Week

An Adelaide businessman was on the news this week after paying $5000 to get access to his data after it was encrypted. In one interview he explained he did not know how it happened and his backup did not work. He has also now bought a new computer. If you are a business you should ensure that you put steps in place along with being educated as to how this can happen and if it does happen , get help , DO NOT DO what this business owner did. So how did this happen Normally through Spam Emails Spam emails are the most typically used method by ransomware creators to send out attacks to potential victims. They are designed to look like they come from a legitimate email address but in most cases can be spotted by the address they come from ( when did you last look ) or… Read More

Continue Reading

It is iOS10 Day For iPhones & iPads- Here Are Some Tips & Details

iOS10 the mobile operating system for Apple iPhones and iPads is available today. First which devices can be updated and if you are not on the list give it a miss: iPhone iPhone 6s iPhone 6s Plus iPhone 6 iPhone 6 Plus iPhone SE iPhone 5s iPhone 5c iPhone 5 iPad iPad Pro 12.9 inch iPad Pro 9.7 inch iPad Air 2 iPad Air iPad 4th generation iPad mini 4 iPad mini 3 iPad mini 2 How big is the iOS10 update ? – about 1.8gb so if you happen to have a 16gb iPhone ( I told people not to buy it ) you may have to make some room but the good news is that you will gain some room after you have installed it. How can i install it? – via wifi or through iTunes but make sure your version of iTunes is up to date. Remember… Read More

Continue Reading

Free Wifi – Is There Anything To Be Concerned About

With the impending completion of the Adelaide city wifi network , how secure is it to use public wifi ? Should you do your banking on one or any financial transactions , such as shopping  These are open wifi networks , which means that traffic , your internet surfing is not encrypted , that means people ( bad guys ) can see what you are doing. There are 3 ways you can be attacked  There are “man in the middle attacks” where a hacker puts themself between 2 computers and intercepts or changes communication between them  “Packet sniffers” where people use computers or mobile devices to intercept any information sent over unsecured wifi  Fake wifi networks which masquerade as legitimate networks in order to steal information  So what do they steal ? Use names and passwords for online banking , social media , emails , shopping  So what should you… Read More

Continue Reading