It appears that an Australian brain surgeon has called the latest report in reference to the report on the potential harmful effects of mobile phones as a wake-up call to users and the telecommunications industry.
Dr Teo, said he was “pleased” that at last there came conclusive proof that mobile phones caused brain tumours. He also went on to say that the report should serve as a ”wake up call’ that should alert both the public and the mobile phone industry to the link between mobile use and cancer.”
As you know a report was released by the World Health Organisation’s cancer research wing that said radio frequency electromagnetic fields generated by cell phones are “possibly carcinogenic to humans” and heavy usage could lead to a possible increased risk of glioma, a malignant type of brain cancer.
Read More…
Tags: android, anti-virus, app stores, apps, attackers, browsers, cancer using cell phones, Cell Phones, Cellular, Computers, criminals, cyber attacks, devices, Facebook, fake sites, Google, Groupon, hardware, internet, iOS, iPhone, Lookout, malicious programs, Mobile, mobile phone users, Online, Passwords, PC's, phishers, phone makers, phone owners, programs, protections, scammers, Security, security checks, security controls, servers, small screens, smartphones, social media, Software, software vendor, technology, touchscreens, Twitter, user names, victims, warning lights, web, Web address bars, websites, WHO, Windows, World Health Organization
It is being reported that hackers have been able to exploit holes in Windows and Microsoft new of the issue since January of 2011.
The exploit deals with the Windows protocol handler in Windows for MHTML. Be advised the exploit can only be done if the user is running Internet Explorer. Apparently, hackers are using cross-site scripting attacks are intercepting and collecting peoples information, spoofing the content that is displayed to the browser, or interfering with the user’s browsing activities. Read More….
Tags: 4Chan, account numbers, address, advantages of using a consultant, anti-virus, applications, attacks, backdoor, best Internet Phone Service, beta, Blog site, Brooklyn, browsers, bug, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, code, commands, computer, computer consultant, Computer Consultants, Computer Help Desk, Computer Install, computer network services, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, cross-site scripting, CSS, data, data centers, DEP, Desktop Services, download, Email, email services, FedComp, format, Gawker sites Hacked, Hackers, hacking, Help Desk Services, hosted exchange, IE, IE6, IE7, IE8, internet, Internet Explorer, Internet Explorer security issues, IT Audits, IT Outsourcing, IT support services, Laptop, link, linksys routers, machine, malware, managed IT services, MHTML, Microsoft, Network Design, network management, Network Optimization, Network routers, Network Services, network solutions, network support services, networks, online data backup, payments, PC repairs, PC's, processor, production servers, prosecution, Routers, Security Issues Windows, sell, Server Management, servers, site, Software, Spam, Symantec, systems, technical support, Telcom Audits, telephone auditing review, test computers, test system, The Syber Group, US Secret Service, Virtual Computers, Virtual Machine, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, website, Windows, Windows Technician, Wireless Internet
As Apple’s popularity continues to increase, so too does the malicious interest of hackers in their famed products. Researchers at Sophos say they’ve uncovered a new Trojan horse program written for the Mac.
It’s called the BlackHole RAT (the RAT part is for “remote access Trojan”) and it’s pretty easy to find online in hacking forums, according to Chet Wisniewski a researcher with antivirus vendor Sophos. There’s even a YouTube video demo of the program that details what its capable of doing.
Sophos hasn’t seen the Trojan used in any online attacks -it’s more a bare-bones, proof-of-concept beta program right now – but the software is pretty easy to use, and if a criminal could find a way to get a Mac user to install it, or write attack code that would silently install it on the Mac, it would give him remote control of the hacked machine. Read More….
Tags: 60606, advantages of using a consultant, anti-virus, antivirus software, apple, attack code, authors, best Internet Phone Service, beta programs, BlackHole, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, criminals, darkComet, data centers, desktop, developers, email services, Google, hacker forums, Hackers, Help Desk Services, installation, internet, IT Audits, IT Outsourcing, linksys routers, Network routers, Online, online attacks, operating systems, OS, PC repairs, PC's, products, programming, programs, proof-of-concept, RAT, remote access, remote access trojan, researchers, Routers, security threats, silently installed, Software, Sophos, source code, Telcom Audits, telephone auditing review, The Syber Group, Trojan horse, tweaked coade, vendors, video demo, Virtual Computers, Virtualization, Virus, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, web, Windows, Windows Technician, Wireless Internet, writers, writing viruses, YouTube
About eight out of every ten internet browsers run by consumers are vulnerable to attack by exploits of already-patched bugs, a security expert said today.
The poor state of browser patching stunned Wolfgang Kandek, CTO of security risk and compliance management provider Qualys, which presented data from the company’s free BrowserCheck service Wednesday at the RSA Conference in San Francisco.
“I really thought it would be lower,” said Kandek of the nearly 80% of browsers that lacked one or more patches.
BrowserCheck scans Windows, Mac and Linux machines for vulnerable browsers, as well as up to 18 browser plug-ins, including Adobe’s Flash and Reader, Oracle’s Java and Microsoft’s Silverlight and Windows Media Player.
When browsers and their plug-ins are tabulated together, between 90% and 65% of all consumer systems scanned with BrowserCheck since June 2010 reported at least one out-of-date component, depending on the month. In January 2011, about 80% of the machines were vulnerable. Read more….
Tags: 60606, Adobe Flash, Adobe Reader, advantages of using a consultant, already-patched bugs, anti-virus, apple, applications, best Internet Phone Service, browser updates, BrowserCheck, Bugs, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, Chrome, cloud computing, Cloud Computing Chicago, compliance management, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, consumer systems, data, data centers, Desktop Services, email services, Firefox, Google, Help Desk Services, IE, internet, Internet Explorer, IT Audits, IT Outsourcing, Java, laptops, linksys routers, Linux machines, MAC, Mozilla, Network Design, Network Optimization, Network routers, new patches, Online, Oracle, out-of-date-components, patches, PC repairs, PC's, plug-ins, Qualys, QuickTime, reader, Routers, RSA Conference, Security, security experts, security risk, security scans, self updating, Server Management, Silverlight, statistics, Telcom Audits, telephone auditing review, The Syber Group, unpatched, Virtual Computers, Virtual Machine, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, vulnerable browsers, web, Windows, Windows Media Player, Windows Technician, Wireless Internet
According to sources Microsoft will release the first service pack update for Windows 7 on February 22nd. The service pack has reached the RTM stage and sent to OEMs earlier this week.
The service pack is said to be a hefty 1.2GB download will feature all prior updates and fixes and Microsoft stated the update will improve networking, security and mobility. Read More….
Tags: 720p, anti-virus, Bill Gates, Business Continuity, Computers, Computing, Data Center, Dell, electronics, Email, Email Messaging, Gaming, Help Desk Support, High Speed Internet, HP, internet, laptops, Lenovo, Mainframes, malware, Microprocessors, Microsoft, Microsoft Exchange, MPLS, Network Security, Network Services, networks, Operating System, OS, PC, PC Hardware, PC's, RAID, Release Candidate, Security, Service Pack 1, super computers, technology, The Syber Group, Virus, VoIP, VoIP Service, VPN Security, web, WiFi, Windows 7, Windows 7 SP1, Windows Phone 7, Windows Server 2008, Windows Service Pack 1 coming February 22nd, Wireless
« Previous Page