31478 Industrial Road Suite 200, Livonia, Michigan 48150 sales@xfer.com

XFER Blog

XFER Blog

XFER has been serving the Livonia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Pay a Hacker Ransom Money and Risk Getting Bamboozled Twice

b2ap3_thumbnail_distributed_denial_of_service_400.jpg
Requesting a ransom from victims is an unfortunate trend gaining momentum in the hacking world. This is typically done using ransomware (where hackers encrypt data and request money for the key) and distributed denial of service attacks (where hackers threaten to overwhelm a system with traffic, thus knocking it offline). In both scenarios, hackers are looking for the victim to pay up, or else. Should they?

Continue reading

How a Nearby Hacker Can Access Your Phone Through Google Now and Siri

b2ap3_thumbnail_cell_phone_hack_400.jpg
These days, mobile exploits aren’t anything to be surprised about. Most people consider their smartphones to be more secure than their desktops or laptops, but the fact remains that there are just as many exploits, if not more, for mobile devices as there are for PCs. One of the latest mobile threats that can infiltrate your iPhone or Android device takes advantage of Siri and Google Now.

Continue reading

If a Teenager Can Hack the CIA, You Can Be Hacked Too!

b2ap3_thumbnail_cia_hacked_400.jpg
With new threats emerging all of the time, it’s no wonder that cybersecurity is such a major part of any technological endeavor. Your should be using the most powerful security solutions on the market in order to avoid intensive hacks. Despite the emphasis that our society places on security, it takes a high-notoriety hack to truly shake the public into action; for example, what if the Central Intelligence Agency were hacked by a teenager?

Continue reading

Tip of the Week: How to Protect Yourself, Your Staff, and Your Kids From Sharing Too Much Online

b2ap3_thumbnail_do_you_share_too_much_400.jpg
Attention people of the Internet, October is Cyber Security Month! Make sure that you share this information with everyone on the Internet that you know. In a situation like this, sharing content with everyone to raise awareness of a worthy cause is perfectly fine. Although, what’s not alright is the sharing of your personal information online.

Continue reading

Tip of the Week: 3 Facebook Security Tips to Protect You and Your Friends

b2ap3_thumbnail_facebook_security_400.jpg
With social media playing such an important role in everyone’s day-to-day lives, one has to wonder to what degree this affects the security of online accounts and profiles. Social media might have revolutionized the way we communicate with others, but it’s also revolutionized the way that hackers stalk their victims. How vulnerable are you and the people you love when it comes to your Facebook settings?

Continue reading

CryptoLocker Strikes Again: This Time, It Hits Gamers Where It Hurts

b2ap3_thumbnail_cryptolocker_400.jpg
Can you believe it’s already been two years since Cryptolocker, a particularly nasty strain of ransomware, was released into the online environment? By encrypting files on a victim’s computer, and forcing them to pay a fee for their safe return, Cryptolocker has been a significant threat to both business and personal environments. Now, however, a particular strain of Cryptolocker is making gamers look like cybersecurity rookies.

Continue reading

Your Inbox Needs a Sheriff with a Strike Plan

b2ap3_thumbnail_security_for_it_400.jpg
Spam emails often contain viruses leading to any number of potentially threatening situations for your company’s network. Therefore, it’s essential that your network has a security solution in place that acts as a sort of virtual sheriff, blocking malicious messages from accessing your network, while granting passage to the good guys.

Continue reading

Tip of the Week: “Windows Hello” Unlocks Your PC With Your Face

b2ap3_thumbnail_facial_recognition_400.jpg
While new Windows 10 features like Cortana and the return of the Start Menu are getting a lot of attention, there’s another cool addition that’s sure to change your Windows experience for the better. Using Windows Hello, you can actually log into your PC... with your face!

Continue reading

Your Computer Can Identify You Based On How You Move Your Mouse

b2ap3_thumbnail_mouse_security_400.jpg
Any user of technology knows that it’s important to optimize security on all fronts of your business. The only problem with this is that passwords aren’t as secure as they used to be. Many businesses have moved in the direction of two-factor authentication, which requires a secondary credential in order to access an account. Did you know there’s a security method that uses your mouse’s behavior to authorize your login?

Continue reading

Tip of the Week: Use This Security Checklist to Protect Your Network

b2ap3_thumbnail_security_checklist_400.jpg
As a business professional, you have a responsibility to ensure that your company’s network and data is protected from hacking attacks. It can be difficult to remember to take all of the necessary precautions, but with our help, you can easily outline all of the measures that should be taken to maximize security for corporate data.

Continue reading

Where Hackers Go to Shop for Malware

b2ap3_thumbnail_black_market_hacker_400.jpg
You might recall how the Silk Road, an illegal online drug market, was recently shut down. Similar to the Silk Road, there’s another distributor of sensitive information out there; this one dealing with zero-day vulnerabilities. These types of cyber threats sell for top-dollar, and hackers are willing to pay in order to access your network.

Continue reading

Social Engineering: Not All Hackers Target Technology

b2ap3_thumbnail_social_engineering_risky_400.jpg
The nature of hacking is to take advantage of weak points and exploit them for some kind of profit. This is usually seen in flaws or vulnerabilities found within the code of a program or operating system, but these flaws can be psychological, too. Hackers are increasingly taking advantage of a concept known as “social engineering” to fool users into handing over sensitive information that can be used against them.

Continue reading

What Really Happens when Websites Collect Your Personal Data

b2ap3_thumbnail_entering_personal_data_online_400.jpg
You might be aware that some websites collect personal data from you depending on your mobile device’s location, your browsing history, and several other factors. This information is generally used for marketing, but it could have unforeseen effects on the way you browse the Internet. It can be fairly revealing about your personality, or possibly even incriminating. Therefore, you should be aware of how this personal information is gathered from you without you even knowing it.

Continue reading

A New Plan Might Make Software Reverse-Engineering Far More Difficult for Hackers

b2ap3_thumbnail_software_re-engineering_400.jpg
Hackers make life difficult for even the most innocent Internet user, and it’s all thanks to a nasty little trick called reverse-engineering. This is when a hacker picks apart the code that makes up a program, then scans it for vulnerabilities or exploitations. A new type of security measure is being developed to protect against the reverse-engineering of software.

Continue reading

Understanding How Advanced Malware Can Harm Your Business

b2ap3_thumbnail_advanced_malware_400.jpg
There are a lot of different threats out there: Viruses, malware, spyware, adware, the list goes on. While all of these threats are certainly problematic, some are more dangerous than others. In particular, advanced malware can be exceptionally devastating if they manage to inflict damage on your technology.

Continue reading

Tip of the Week: 7 Common Methods to Protect Your Smartphone

b2ap3_thumbnail_smartphone_security_400.jpg
Those who believe that smartphones are secure from threats are in for a rude awakening. Modern businesses need to apply adequate security practices to maximize the protection of mobile devices, or risk everything.

Continue reading

Can “Spaced Repetition” Be the Key to Remembering Complex Passwords?

b2ap3_thumbnail_password_login_400.jpg
Is the password an outdated type of security measure? This question seems to be getting asked around quite a bit, especially with more powerful threats loose all over the Internet. Unfortunately, the fault in passwords generally lies in the fact that humans generally don’t pick passwords that are secure enough. Thanks to a new method called “spaced repetition,” it seems there might be some hope left for the password after all.

Continue reading

Improve Content Filtering with Google Chrome’s Safe Browsing Feature

b2ap3_thumbnail_chrome_safe_browsing_400.jpg
Malware often takes the form of certain unrecognizable web entities, which can make detecting threats tricky at times. New features in popular web browsers, most notably Google Chrome, are making progress toward identifying these threats before they cause your business harm. Chrome’s “Safe Browsing” feature is a good tool to augment your current network security practices.

Continue reading

Search Engine Wars: Protect Yourself From Malicious Websites

b2ap3_thumbnail_search_security_400.jpg
While most search engines are pretty good at weeding out malicious sites and not displaying them, some are better than others. According to AV-Test, a German independent testing lab, the top search engines, Bing and Google, are miles apart in terms of secure searching.

Continue reading

DDoS Attacks Can Lead to a Lot More than an Overloaded Server

b2ap3_thumbnail_ddos_attacks_becoming_a_problem_400.jpg
We’ve mentioned distributed denial of service attacks (DDoS) before, and we’ve emphasized the importance of protecting yourself from threats which can cause downtime. However, we think the recent attacks by Lizard Squad take DDoS to an entirely new level.

Continue reading