31478 Industrial Road Suite 200, Livonia, Michigan 48150 sales@xfer.com

XFER Blog

XFER Blog

XFER has been serving the Livonia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Shopping Tips to Protect Yourself from the Next Major Retail Data Breach

b2ap3_thumbnail_credit_card_security_400.jpg
Major retailers are having a rough time of it these days concerning the security of their customer's financial information. Last December, Target was hit with malware that compromised 40 million customer credit and debit card accounts, and recently, Home Depot was hit with the same malware. What's a connoisseur of mass-produced boxed goods to do?

0 Comments
Continue reading

Hackers Lay Claim to 4½ Million Medical Records

b2ap3_thumbnail_stethescope_keyboard_400.jpg
If 2014 hasn't been a legendary year for data breaches yet, it certainly is now. Community Health Systems, a hospital network for over 206 facilities across the United States, has been the target of a data breach resulting in 4.5 million records being compromised by Chinese hackers, including Social Security numbers, birthdays, names, addresses, and telephone numbers.

0 Comments
Continue reading

Hairballs and WiFi Data are What the Cat Dragged In

b2ap3_thumbnail_warkitteh_on_the_loose_400.jpg
For Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi networks. Have you taken the proper security measures to protect your sensitive information from feline foes like Coco?

0 Comments
Continue reading

Is Your Antivirus Software Up to Snuff?

b2ap3_thumbnail_is_your_antivirus_working_for_you_400.jpg
All of the security breaches and vulnerabilities of 2014 sure have made for an interesting year; first Heartbleed, then the Internet Explorer vulnerability, GameOver Zeus, and the Russian password-stealing gang. In light of these events, you really have to ask the question, "how can we fight these threats?" Symantec has told The Wall Street Journal that they feel antivirus technology is "dead."

0 Comments
Continue reading

USB Software is Bad to the Bone, Literally

b2ap3_thumbnail_badusb_a_threat_400.jpg
USB devices have long been a staple of the technology world, but are notoriously vulnerable to exploitation from hackers and malware. As malware grows more and more sophisticated, you can no longer trust simple antivirus scans to protect your business.

0 Comments
Continue reading

How an Intimate Selfie That’s Deleted Can Be Recovered and Used for Blackmail

b2ap3_thumbnail_smartphone_security_400.jpg
When it comes time to upgrade, many smartphone users will sell off their old device in hopes of making extra cash. However, if the phone's memory is improperly wiped, an experienced hacker can use advanced tools to recover sensitive data off the used phone. Let's talk about how this happens and what can possibly be recovered by a hacker.

0 Comments
Continue reading

Apple’s iOS May Contain Backdoors to Leak Sensitive Information

b2ap3_thumbnail_ios_vulnerability_is_curious_400.jpg
Apple's iOS operating system might be well known for its impressive security features, but that doesn't mean that it's invulnerable to all threats. In fact, backdoors may have been located in the operating system, which allow Apple and law enforcement agencies like the NSA to access the devices.

0 Comments
Continue reading