Information Technology News & Information

How to Download a Facebook Live Video

There are many reasons why you would want to download a live video from Facebook, whether it is yours or someone else’s. Sometimes a video is shared into a very active group and finding it later would be a bit tasking. Another reason why someone may want to download their own live videos is to keep a copy for future reference, or even upload it to another social media platform like Instagram. For whatever reason you may have, here is a step-by-step explanation on how to do it. First, this article will outline the process of downloading your very own live video from Facebook, then explain how to download someone else’s live video from your wall, or a group where the video was shared. Previously, Facebook didn’t have this feature and it was difficult to download a live video but now it is available and very easy to use. Downloading your own live video from Facebook Step 1 Locate the video on your Facebook account page profile or on your feed. On the left side bar you will see under “Explore”, a button for Live Videos. When you click on that button, it will generate all the live videos you have shared or the ones that have been shared on your wall. Find the one you would like to download, then click on it to open it. Depending on the method you choose to access the video, say through your feed, you will also be required to click on the time stamp. Once you click on the time stamp, it will open the video. On the right side of the screen, you can also view all the comments about the video. Step 2 On the upper right side, there are three dots. Click on them and you will get a number of prompts including one allowing you to download your video. Click on this and you will start downloading the video automatically. It will be saved to your device as an MP4 video. Now you have the video downloaded to your hard drive. You can share the video to your other social media platforms, email it to someone, or use it for whatever purpose you like. Downloading someone else’s Live Video Downloading someone else’s live video from Facebook is totally different from downloading your own. This is because of the strict privacy measures put in place by Facebook. The steps are a bit complicated and you may need to use a third party site in order to download the video and save it directly to your device as opposed to saving it on your Facebook page as a feed. There are other strategies of course, such as switching to the mobile version of Facebook. The bad news is that this is no longer supported by most web browsers. So for now, we will discuss the other option of using third-party software to download someone else’s live videos. One of these programs is called SaveFrom.net. Step 1 Find the live video, open the time stamp, and play it. Locate your browser’s address bar, which is always at the top of the page. This displays the URL to the video. Highlight and copy the link. Alternatively, just right click on the video and then choose the option, Show Video URL. This is another method of copying the link. Step 2 Go to the SaveFrom.net site and paste the web link there. Step 3 Click the download button and you will have a drop-down menu with two options: download your video as an MP4 or in High Definition (HD). Choose a suitable format to save the video to your device. Browser Extensions Some browsers, such as Chrome, do have download extensions that you can use to download a Facebook Live Video. These extensions include Fbdownloader and Social Video Downloader, just to mention a few of them. The trick to choosing the most suitable method to use when downloading a live video is the time it takes to do this and also the quality of the video saved. Choose a method that is best for your situation. Wrap Up Live Videos on Facebook are becoming a common trend lately and they are preferred because they have a larger social media following compared to YouTube. It’s common to see everything from funny cat videos to breaking news stories. Millions of people all over the world use Facebook today and everyone enjoys viewing the many videos found there. In addition, more people are using Facebook as compared to any other social media platform. The important thing to consider is time and quality of the video. Depending on the device that you are using, you may have a number of options to choose from when downloading your video as discussed above.

Information Technology News & Information

iPhone Users: Don’t Run 11.4.1 Update

Are you using an iPhone or iPad?  It may be worth it to hold off a few days before hitting that update button. Why? Reports are surfacing that after updating to #IOS 11.4.1 there are issues with app updates. The App store shows many apps that need to be updated, but when you press ‘update‘ or ‘update all’ the apps updates are failing. Click Here To Learn More We recommended holding off until Apple fixes these update issues. Have any questions regarding the recent iPhone/iPad update?  We welcome you to reach out to us at {phone} or {email}.

Information Technology News & Information

URGENT! Google Chrome “HTTPS By Default D-Day” Is Today! (July 24, 2018)

Why the big hubbub over HTTPS?… Because from now on, users who visit HTTP sites will be hit with a BIG WARNING from Google. This will happen to anyone using Google Chrome version 68. Google warns that you should have been protecting your websites with HTTPS for a while now. And this isn’t just for confidential communications. You need HTTPS on all your sites. Why?… HTTPS Prevents Intruders And Security Vulnerabilities You certainly don’t want people (criminals or otherwise) tampering with the communications between your site and your users’ browsers. These intruders can be hackers or legitimate companies like Internet Service Providers (ISPs) that inject ads into your web pages. Did you know that some of these advertisements can block the user and create security vulnerabilities on your site? HTTPS Protects Your Users’ Privacy Every unprotected HTTP request to your website can potentially reveal your visitors’ private information, such as their browsing behaviors and even their identities. Some intruders gather bits of information and compile it into user “profiles” to steal their identities. HTTPS also keeps intruders from listening to communications between your website and your visitors. This means if you don’t use HTTPS and you have an online help desk service with VoIP, someone else other than your rep and your client may be listening. Intruders can trick your visitors into providing their confidential information or installing malware into your website.  They can access and exploit unprotected images, cookies, scripts, HTML … and they can do this at any point along the network. This means that your users’ machines, a clients’ Wi-Fi hotspot, etc., could be exploited and you’ll be to blame. HTTPS Is Required For Progressive Web Applications (PWAs) What are PWAs?  They use modern website capabilities to deliver app-like experiences to your users. Google likes PWAs because they:  Load instantly, even when your visitors use uncertain network conditions. This is because they “live” on the user’s home screen. They don’t need to go to an app store for them. PWAs can also re-engage your users with push notifications. You can control how the app is launched and appear on your site. Respond fast and smoothly. Did you know that 53% of users leave a site if it takes longer than 3 seconds to load? Are engaging and provide an immersive user experience. You can pre-cache resources so you’re not so dependent upon the network.  It gives your users a more reliable experience when browsing your site. Google Says That HTTPS Is The Future In addition to the security benefits of using HTTPS, there are commercial benefits as well.  Browsers and search bots prefer HTTPS sites. Your site will be easier for visitors to find. Today’s new web platform features allow things like taking pictures, recording audio and new geolocation APIs (Application Program Interfaces). They essentially provide offline app experiences. HTTPS is a key component to the permission workflows for both new features and updating APIs. And take note! Watch for HTTPS warnings from Microsoft, Apple and Mozilla. They’ll be coming soon. Keep Google happy and your users safe. It’s not expensive to switch to HTTPS and it’s certainly worth doing!  

Information Technology News & Information

What The Sunset Of Windows 7 Means To Its Users

Windows 7 is being “put out to pasture” by Microsoft at the beginning of 2020.  Not all Windows 7 users are aware of precisely what this means and how it can affect their day-to-day business.  Because of impending issues, such as steadily degrading usability and increasing security vulnerabilities, Windows 7 users need to know what to expect and what their options are.  Quick Background On Windows 7 Windows 7 was released in October of 2009.  Its purpose was to serve as an incremental upgrade to the not-so-well-received Windows Vista operating system. Windows 7 included some much-needed improvements to Windows Aero, the new user interface that Microsoft introduced with Vista, and with improved performance.  Users responded far more positively to Windows 7 than they did Vista, primarily because it addressed so many of Vista’s deficiencies.  The Windows 7 Service Pack 1 came out in 2011, and a platform update was released a few years later in 2013. By 2014, however, Microsoft began preparations for the retirement of Windows 7 as they began stopping its retail sales.  Next, mainstream support for the operating system came to a halt.  In 2016, PCs were no longer shipped with Windows 7 pre-installed.  Microsoft then announced that on January 14, 2020, extended support for Windows 7 would end.  That was the official sunset announcement. What Sunset Means Sunset begins with Microsoft no longer offering extended support for Windows 7.  It also means no more security updates, bug fixes, or service packs.  That, in turn, means the usability, security, and performance of Windows 7 will begin to degrade with time.  On the surface, applications and the operating system will generally perform all right, but there will always be exceptions.  Over time, however, there will be a definite trend toward more issues, steadily poorer performance, and serious security vulnerabilities. Why This Important to Windows 7 Users Here is what a Windows 7 user can expect to see after sunset begins: Software, utilities, and features may become incompatible Applications no longer receive updates that apply to Windows 7 New devices (g., printers or webcams) may not be able to connect with Windows 7 Antivirus will not be updated, and third-party virus protection software will eventually stop supporting Windows 7 Software bug fixes are no longer patched, leaving the system open to exploitation Online banking transaction systems may expire if their authentication and encryption methods cannot be supported by Windows 7 Also, incompatibility can quickly become a problem for companies whose customers or partners need them to use or interface with software that simply will not run correctly on Windows 7.  Running a sunset operating system can also cause problems when attempts are made to add devices or install new software. The most serious issues with sunsetting are those involving security.  Hackers will know that Windows 7 has become vulnerable and will seek out ways to exploit those weaknesses.  This leaves a system susceptible to malware, ransomware, and viruses.  The probability of suffering from an attack that renders your computers unusable will continue to increase with time. Options Available to Windows 7 Users If you are running Windows 7, then now is the time to start migrating to a new operating system.  The most straightforward upgrade path would be Windows 10, which still has some of the look and feel of Windows 7 with a plethora of new features and even better usability. The other option for most businesses is switching to Mac OS.  This means an entirely new work environment for traditional Microsoft users. This option can involve a steep learning curve.  While some Microsoft packages, such as Office, are available for Mac OS, they work a bit differently and it will take some time for new users to become proficient. Macs can also be more expensive than a Windows-based computer system, but have a reputation for being more reliable. Unless a business is heavily involved in video production or graphic design, Windows 10 is probably the best option. Getting Ready to Migrate Before migrating, perform an inventory of software and group each application into one of three groups: unwanted, optional, or required.  Some software may require an upgrade to run on a newer operating system.  Next, prepare a similar inventory of hardware.  As with the software, some hardware may need to be updated or replaced to remain compatible with the new operating system. Also, check the requirements of the replacement operating system, paying special attention to available hard drive space, physical memory, and processor or CPU needs. Please note that if a machine is already getting a bit outdated (e.g., 7 or more years old), it might make sense to purchase a new machine with Windows 10 pre-installed. The Trump tariffs will cause an increase in the price of computers, scanners, printers, servers and even their components. So now is definitely the best time to buy! Conclusion With the sunset of Windows 7 impending, now is the time to start the process of migrating to a new operating system, whether it be Windows 10 or Mac OS.  Failure to upgrade will not only lead to issues with compatibility and performance, but will involve serious security risks.

Information Technology News & Information

Check Out The 10 Best Tablets of 2018 (Ratings/Reviews)

They are the next best thing to hauling your laptop around to school and on flights, and they’ve become the weapon of choice for parents with fussy toddlers in public spaces. But while tablets have earned their accolades in recent years, that’s not to say choosing one to take home is an easy task. With endless options to select from, it will take some time and research to determine which tablet is best for your unique needs. What constitutes a great tablet depends on several factors. Aside from function, things like versatility, user-friendliness, and affordability all play a role in how well a tablet is received by the masses. Versatility carries so much weight, in fact, that many of today’s top tablets come with keyboards to offer an experience similar to that of a desktop. These 2-in-1s are all the rage, and if you’re hoping to pick up a new one, you’ve got your fair share of picks. Here are some of our favorite tablets to help you navigate your options. Apple iPad The Apple iPad is one of the most revered tablets to date, and the newest version spares no expense when it comes to cool features. Compatible with the new Apple Pencil, the tablet is easy on the eyes with a 9.7-inch Retina display and a small, but mighty A10 Fusion processor for all the power you could want in a tablet. Plus, Apple now carries plenty of options for immersive AR experiences, and at its most affordable price point yet, you can be sure this tablet is one to covet for business and entertainment alike. HP Envy x2 HP’s Envy x2 model, hot off the heels of the debut of the Snapdragon 835 processor, allows for stronger performance and a load of other features. Fast-charging capabilities, optional LTE connectivity, and a 15-hour battery life are just a few things users have to look forward to in this tablet. From a digital pen to a sleek backlit keyboard, the Envy x2 is versatile and durable, and definitely not one to be looked over if a solid tablet is on your wish list. Acer Chromebook Tab 10 Created in collaboration between Acer and Google, the Acer Chromebook Tab 10 is a 9.7-inch slate tablet perfectly fitting of its target K-12 education market. The first tablet to be powered by Chrome OS, it features a 2,048 x 1,536 resolution display, and a textured design for easy handling on-the-go. It also comes complete with an EMR stylus, which fits conveniently in its own slot. This tablet was definitely built for convenience. Samsung Galaxy Tab S3 With a 2048 x 1536 resolution AMOLED display, the Samsung Galaxy Tab S3 is primed for immersive entertainment. Inside you’ll find a powerful quad-core Snapdragon 820 CPU and a sufficient 4GB of RAM. Its 600mAh battery is good for up to 12 hours of power, whether you’re hoping for gaming or Netflixing. It also comes with a bundle featuring the new S-Pen, which is ideal for creatives hoping to use this tablet for work. All in all, between its power and its potential, the Galaxy Tab S3 is among the best money can buy. HP Chromebook x2 The HP Chromebook is heavy on both looks and performance. This 12.3-inch tablet is touted as the first detachable Chromebook and comes complete with a base hinge for keyboard attachment. It runs on Google’s Chrome OS and can download apps from Google’s Play Store. Aside from an impressive QHD display, it offers both front and rear facing cameras and includes the new HP Active Pen to make tasks like sketching that much easier. Dell Latitude 5290 2-in-1 This 2-in-1 is pricey, to be sure, but that’s not to say it isn’t worth the money if power is what you’re after. Weighing in at just 2.64 pounds, the tablet boasts an eighth-gen Intel Core i7 processor and a crisp, clear screen ideal for work or play. Gorilla Glass 4 for durability and an adjustable kickstand are just a couple of the perks you’ll find on this hybrid, and that’s not all. There is also an optional keyboard to make typing a breeze. Lenovo Miix 630 The Lenovo Miix 630 has a unique advantage over its competitors. It can stay connected all day via LTE, which is enabled by a Qualcomm Snapdragon 835 processor. It’s a fresh option for Windows devices, courtesy of a partnership between Qualcomm and Microsoft. And with this Snapdragon processor also comes an extended battery life, upwards of 20 hours. So if you happen to be looking for a tablet to replace your laptop for business, the Lenovo Miix 630 is a suitable option, indeed. Surface Pro 4 Equal parts tablet and laptop, the Surface Pro 4 gets right a lot of what the original Surface Pro got wrong. Its 12.3-inch screen offers more than enough space for clear, crisp pictures, and its configuration capabilities are nothing to scoff at. From its dual cameras to its loudspeakers and extraordinary picture quality, the Surface Pro 4 is the best of both worlds. Xplore XBOOK L10 One thing’s for sure: durability isn’t an issue with the Xplore XBOOK L10. Waterproof, dustproof, and drop proof for up to six feet, this tablet is one with plenty going on. It’s got a plethora of ports, including USB-C, USB-A, and Ethernet, with its powerful performance courtesy of an eighth-gen Intel Core i5/i7 processor. And with an ultra-bright display, there isn’t much this tablet can’t do. Google Pixel C The Google Pixel C, which many call a solid alternative to the Apple iPad, has a unique design that sees its optional Bluetooth keyboard double as the tablet’s cover. Its made from durable compact aluminum, and boasts a lightning fast performance plus a bold, bright screen bound to make your favorite games that much more enjoyable. If Android is what you’re after, this is simply one of the best.

Information Technology News & Information

August 2018 Ransomware Update

The Newest Forms Of Ransomware & How To Protect Your Business From Them The Situation Ransomware is now one of the top security concerns for businesses and organizations of all sizes. The City of Atlanta was hit with a ransomware attack called SamSam in March, crippling some important departments like their court system, sewer infrastructure requests, and water billing department. The attackers who deploy SamSam are known for clever, high-yield approaches. This, combined with the City’s lack of preparedness, explains why the infection was so debilitating. Experts are telling us that SamSam will strike again. Unlike many forms of ransomware that spread via phishing attacks where individuals inadvertently invite the attack, SamSam exploits IT system vulnerabilities and cracks weak passwords. These ransomware attackers have made $1 million in less than six months. Keeping all your systems patched, storing data in enterprise-based cloud backups, and having a ransomware preparedness plan can offer real protections against SamSam and other ransomware infections. Unfortunately, ransomware attacks are on the rise, and as hackers use more sophisticated encryption technology, the threat is constantly evolving. According to malware security firm Barkly, a company is hit with a ransomware attack every 40 seconds. They also identified ransomware as the most prevalent form of malware, with “4.3x new ransomware variants in Q1 2017 than in Q1 2016.” This eBook details how dangerous ransomware is, how it could harm your business, and what you should do to protect your data. Part 1 What is Ransomware? Ransomware is a type of malicious software (malware) that blocks access to a computer that infects, locks or takes control of a system and demands a ransom to unlock it. It’s also referred to as a crypto-virus, crypto-Trojan or crypto-worm. It then threatens that your data will be gone forever if you don’t pay using a form of anonymous online currency such as Bitcoin. Most forms of ransomware are spread via spam using unsolicited phishing email or an attachment. Phishing attacks use emails disguised to look like they’re from someone you know and are more likely to trust. Some ransomware-based applications disguise themselves as police or a government agency, claiming that your system is being locked down for security reasons and that a fine or fee is required to reactivate it. Then it typically asks you to click on a link or attachment to perform a routine task such as updating records or account details. If you do this, a worm or malware is downloaded, infects your system and locks it by encrypting your files. Ransomware, like SamSam, can also infect your IT system using vulnerabilities in your computer’s browser. It does this when you click on a malicious code hidden in online ads or free software. Ransomware targets small to medium-sized businesses because they are particularly vulnerable due to limited IT resources. They are also more likely to pay the ransom in the hopes that they’ll get access to their data, although the FBI warns that this isn’t necessarily so. “Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cybercriminals to target more organizations, but it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.” Paying the ransom only guarantees that the malicious actors receive your money, and possibly even banking information. Also, decrypting files does not mean the malware infection itself has been removed. No one is immune. Temporary or permanent loss of sensitive or proprietary information, Disruption to regular operations, Financial losses to restore systems and files, and Potential harm to your organization’s reputation. The lack of awareness and cybersecurity training is a leading cause of ransomware. Part 2 Ransomware Comes in Many Forms. Ransomware comes in many different forms, but essentially, it’s a type of malware that denies access to your computer devices unless you pay a ransom. The ransomware malware encrypts your data. Once it does this, it can travel throughout your network and encrypt other mapped and unmapped network drives. Because of this, it can bring your organization to a halt. The ever-evolving nature of these threats makes ransomware very difficult to keep track of. Ransomware-as-a-Service (RaaS) makes it easy for cybercriminals to set up a lucrative hacking scheme. It is provided as a vendor platform on the Dark Web. Unlawful vendors offer hackers and criminals a tool to use to lock down computer files, information or systems and hold them hostage. Ransom32 is a type of “Ransomware-as-a-Service” that provides any cybercriminal, even those without technical knowledge, the ability to create their own form of ransomware. What makes Ransom32 so dangerous is that it uses JavaScript, and can be used on computers that run Windows, Mac OS X, and Linux. Over 2,900 types of ransomware have been reported, and they’re growing. Here are just a few: Bad Rabbit  Bad Rabbit has infected organizations in Russia and Eastern Europe and is spreading throughout the world. It does this via a fake Adobe Flash update on compromised websites. When the ransomware infects a machine, users are directed to a payment page demanding .05 bitcoin (about $285). Cerber This ransomware encrypts your files using AES encryption and demands a ransom of 1.24 bitcoins (worth $500). It communicates via a text-to-speech voice message, a recording, a web page, or a plain text document. There’s no way to decrypt files that are encrypted by Cerber unless you pay the ransom. Cryptolocker CryptoLocker infects computers that run Microsoft Windows. Like other forms of ransomware, you must pay the hackers to decrypt and recover your files. CryptoLocker spreads via fake emails (phishing) designed to mimic legitimate businesses. CryptoWall This form of ransomware has been around since 2014, but new variants are still circulating, including CryptoBit, CryptoDefense, CryptoWall 2.0, and CryptoWall 3.0. Like CryptoLocker,

Information Technology News & Information

The 10 Most Secure & Insecure Airports For WiFi In The United States

Is It Safe For Me To Use The Airport’s Public Wi-Fi When I Travel? Most airports around the U.S. and abroad provide free Wi-Fi service to travelers stranded in their terminals, waiting for their flights. While this service may appear to be generous, a recent study by Coronet, a cybersecurity company, suggests you might want to think twice before connecting to the airport’s Wi-Fi. According to Coronet’s findings, most airport public networks are unencrypted, insecure, or improperly configured. Hackers, therefore, have easy access to devices connected to the networks and they can potentially steal your personal data. What Can Hackers Take? Most public connections are either unsecured or require shared passwords. Hackers want to get between you and the websites you visit in order to look at your information. They do this with little effort on public Wi-Fi networks. A weak network makes it easy for a hacker to gain access credentials to cloud apps, such as Microsoft Office 365, G-Suite, Dropbox, and iCloud. They can send malware to your device and the cloud, as well as breach your various forms of infrastructures. Although it’s not horribly difficult to cancel and replace credit cards and void unauthorized transactions, once passwords and business digital frames are exploited, it’s incredibly challenging to recuperate complete control over them. How Were These Findings Conducted? Coronet revealed which airports have the most vulnerable networks. They came up with a ranking system of airports by their threat level. Coronet amassed data from more than 250,000 consumer and corporate endpoints over a 5-month period that went through the 45 busiest US airports. They gave each of the airports a threat index score after assessing the vulnerability of the traveler’s devices who used the airport’s network. “Far too many U.S. airports have sacrificed the security of their Wi-Fi networks for consumer convenience. As a result, business travelers, in particular, put not just their devices, but their company’s entire digital infrastructure at risk every time they connect to Wi-Fi that is unencrypted, unsecured, or improperly configured. Until such time when airports take responsibility and improve their cybersecurity posture, the accountability is on each individual flyer to be aware of the risks and take the appropriate steps to minimize the danger.” – Dror Liwer, Coronet’s founder and CISO Top 10 Most Cyber Vulnerable Airports: Boston Logan International Airport Detroit Metropolitan Wayne County Airport Charlotte Douglas International Airport Phoenix Sky Harbor International Airport Dallas Love Field Newark Liberty International Airport Southwest Florida International Airport William P. Houston Hobby Airport John Wayne Airport-Orange County Airport San Diego International Airport How Did The Hackers Specifically Get Traveler’s Information? In its report, Coronet revealed some specific ways in which hackers were able to infiltrate the airport’s network and steal people’s information. In the worst rated airport, the data revealed that hackers in San Diego set up an “Evil Twin” hotspot with the name “#SANfreewifi” at the airport to trick users into connecting to it. This allowed them to have access to all of the files that the victims downloaded or uploaded while they were connected. Similarly, at Houston’s William P. Hobby Airport, which was rated third weakest, hackers created a network named “SouthwestWiFi.” Top 10 least vulnerable airports: Chicago-Midway International Airport Raleigh Durham International Airport Nashville International Airport Washington Dulles International Airport San Antonio International Airport Louis Armstrong New Orleans International Airport Kansas City International Airport Lambert St. Louis International Airport Miami International Airport Tampa International Airport How Do I Prevent Hackers from Attacking Me? You don’t have to stop using public Wi-Fi for the rest of your life, and it’s not exclusively the airport’s fault. Let’s look at an easy solution to protect you from the majority of hackers. Make Passwords Stronger You have the ability to turn on two-factor authentication for all your web services. How this works is when you try to login to a website, the website will text message your phone with a code that you’ll enter into the site in addition to your password. Even if a hacker has your password, they won’t have your phone — which makes it much harder for them to log in to your account. Use a VPN A VPN (virtual private network) is a secure and private solution within the wider internet itself that allows you to send and receive data while maintaining the secrecy of a private network. If you access your data remotely via a VPN connection when you use public Wi-Fi, it can protect data from interception and networks from compromise. Stay Vigilant Most importantly, remember to always be alert and use caution when browsing the internet. In your browser, block cookies and remove tracking. Avoid unsafe or untrusted software recommendations. And lastly, avoid suspicious links in your inbox or on your social media feeds.

Information Technology News & Information

Intel Chip Vulnerabilities: What We Know So Far!

What Do We Know About Terminal Fault (L1TF) Chip Vulnerabilities? Understanding The L1 Terminal Fault (L1TF) Intel has recently confirmed L1 Terminal Fault (L1TF) chip vulnerabilities in its processors that can be manipulated by malware and malevolent virtual machines with the intention of stealing private information from a computer’s memory. Who or What is Vulnerable? In short, Intel’s desktop, workstation, and server CPUs are exposed. What Intel initially described as impregnatable memory, has been found to have holes. That means sensitive data from other software and other customers’ virtual machines can be stolen from malicious software and guest virtual machines either on a vulnerable device or a cloud platform. This private information may involve personal and financial accounts, passwords, and encryption keys. Also, they pose a threat to be taken from other customers’ virtual machines, including both System Management Mode (SMM) memory and SGX enclaves. SGX, made by Intel technology, is intended to guard private information from code geared to peep and pry. SMM serves as a computer’s clean-up operator.  This is an alternate software system that is usually placed in the computer’s firmware. It also has total control over the computer’s hardware and absolute admittance to all of its data. Let’s break down the three areas, which Intel has named its L1 Terminal Fault (L1TF) bugs: CVE-2018-3615 CVE-2018-3615 impacts Software Guard Extensions (SGX). More specifically, Intel says, “Systems with microprocessors utilizing speculative execution and software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via side-channel analysis.” The researching teams who discovered CVE-2018-3615, named the vulnerability, Foreshadow. The Fix: Fixing this vulnerability will require the microcode update. To be safe, it is also recommended that you update your operating system and VM hypervisor. The patches should be available now for just about all operating systems. This bug was discovered by two different groups: Jo Van Bulck, Frank Piessens, Raoul Strackx from imec-DistriNet – KU Leuven. Marina Minkin, Mark Silberstein from Technion, Ofir Weisse, Daniel Genkin, Baris Kasikci, Thomas F. Wenisch from The University of Michigan, and Yuval Yarom from University of Adelaide and CSIRO’s Data61. CVE-2018-3620 According to Intel, “Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and side-channel analysis.” In short, CVE-2018-3620 affects operating systems and SMM. The Fix: To fix this, operating system kernels will need to be patched. Also, the SMM needs the microcode update, to be safe. CVE-2018-3646 Intel states, “Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and side-channel analysis.” CVE-2018-3646 affects hypervisors and virtual machines. The Fix: Fixing CVE-2018-3646 will require the microcode, operating system, and hypervisor updates in order to protect your data. Extra Fix: The way hypervisor software operates is by allowing virtual machines or processors to be run off shared resources of a physical server. At the same time, they use multi-threading – a technique by which a single set of code can be used by several processors at different stages of implementation. Intel calls this Hyperthreading, and it can split one of its cores to act like two separate processors of the multi-core CPU for the hypervisor. This technique creates what Intel calls “sibling threads.” Since these threads share a pool of L1 cache memory attached to the core, a malicious guest, on one of the virtual processors, could manipulate the third variant of the L1 Terminal Fault and get data used by the other sibling thread. Even though the virtual processor will recognize this and deny the request of the hacker, if the data is in the cache at the same time, it can be revealed to the hacker. Both CVE-2018-3620 and CVE-2018-3646 were discovered by Intel’s engineers after the university researchers who discovered “Foreshadow” informed Intel about CVE-2018-3615, the SGX issue. The Ultimate Fix The real fix to all these problems will be made by replacing the processors. As Intel stated, when addressing L1TF, “These changes begin with our next-generation Intel Xeon Scalable processors (code-named Cascade Lake), as well as new client processors expected to launch later this year.” For now, the best advice is to keep patching and be aware of any changes you see in the area of performance and speed with the patches.

Information Technology News & Information

Can Business Benefit From Microsoft Office 365?

In today’s business world, it’s important for companies to stay ahead of the trends when it comes to the latest in tools for productivity. Office suites like Microsoft’s Office 365 have become popular among organizations hoping for more effective performance and communication. With Office 365’s subscription plans, users gain access to the full list of Office apps such as Word, PowerPoint, Outlook, OneNote, Publisher,  and Access, plus so much more. There are endless benefits associated with Office 365 subscriptions, from the convenient communication tools, to productivity apps intended to help users make the most of their workdays. These apps are updated monthly, so you can be sure you have access to the latest features and security updates available. Here we’ll explore why a growing number of businesses are turning to Office 365 for their business needs. Is It Convenient And Accessible? One major benefit of Office 365 is its accessibility. Installing Office 365 across multiple devices ensures your work goes with you, wherever that may be. Whether you’re browsing from your office computer or mobile phone at home, you can be productive. What’s more, SharePoint makes for easy sharing between coworkers. For instance, if you edit a document from your computer at home, your colleague will be able to view that same file from their phone and see the most up-to-date version of the document. Since these documents are accessible via the cloud, users are able to customize security settings to be as strict or as lenient as required. Whether you want your entire organization or just a few colleagues to gain access, SharePoint allows for a number of options to ensure proper security for your creative work. Office 365 also makes it easier to locate content. In office settings, there are many players involved. Once upon a time, workers were forced to go on a wild goose hunt in search of files, which may or may not be stored across any number of employees’ email boxes. Office 365 SharePoint allows one single place to store important documents, photos and communications, so you can find important files when needed most. Today’s businesses are also on the lookout to improve organizational productivity. Office 365’s Email and Calendar options offer ample mailbox storage, the ability to schedule meetings simply and quickly, and the ability to share your schedule and availability with coworkers and colleagues. Does Office 365 Provide Enhanced Communication? Effective communication among coworkers, teams, and departments is crucial for growth within a company. While methods like e-mail are sufficient, the benefits of instant communication can’t be denied. In addition to traditional Email, Office 365 Business provides access to Yammer, Skype for Business and Teams. In a business landscape with an ever-increasing number of remote workers, effective communication is key, and when it comes to chatting, you’ve got options. Skype For Business is a unified communications platform offering instant messaging, video, and audio conferencing. Online meetings are simple and offer a range of other benefits. You can immediately see your coworkers’ availability status, share a whiteboard to allow for brainstorming in real-time and share documents on-screen in real time. And with Office 365, management is intended to be easier than ever. From user creation and deletion, to managing passwords, user roles, security and distribution lists, the program’s management tools are built for success. Does It Have a Chat or Meeting App? Microsoft Teams is another useful feature found within the Office 365 suite. This takes teamwork to a new level, with the ability to chat, share files, and organize meetings. According to Microsoft, over 200,000 businesses across a total of 181 markets are using Teams to collaborate with their coworkers. Recently, the company has introduced a free version, which includes unlimited chat and searches, built-in audio and video calling, 10GB of team file storage, and numerous apps. With the Teams paid version, you’ll gain access to additional storage, and enterprise security, among other features. While Skype has long been the method of choice for communication on-the-go, many users find the Teams interface to be simpler and more effective for instant feedback from team members. Microsoft Announces Lift On Device Limits Eager to enhance the user experience for paid subscribers, Microsoft recently announced a major change to its current subscription service. Beginning October 2, Microsoft will lift its limits on device usage for Office 365 subscribers. While the previous limit allows for 10 devices, users can now utilize Office 365 on an unlimited number of devices. Office 365 Makes An Impact on Business Growth Office 365 is making an impact across thousands of businesses, and its benefits stretch far beyond Excel, Outlook, and PowerPoint. Office 365 carries with it countless commands that can be of great value to individual users and businesses. If your organization is searching for a means of enhanced productivity and communication, consider all that Office 365 has to offer. It may be just the tool you’re looking for to help your team grow.

Information Technology News & Information

How Can Instagram Accounts Be Hacked?

What Is Instagram And How Is It Vulnerable? Instagram is a recently created social media site that allows users to share images and videos. It is owned by the same soul that owns Facebook, Mark Zuckerberg. Originally created in the partnership of Kevin Systrom and Mike Krieger, and officially launched in 2010, it first appeared on iOS before its increasing popularity brought it to Android in 2012 and Windows in 2016. Its features include editing filters, messaging, location display, tag browsing in searchers, content ‘liking,’ and trend viewing. Last year, the service reported that they had 800 million users, only five years after being purchased by Facebook. Bought for $1 billion, 40 billion people all over the world have been uploading images for years. While it is generally considered a beneficial and popular social media app, the software has been targeted by critics for several reasons: Changes to interface features and use policy The nature of censorship used The ability for users to upload content that’s illegal or inappropriate. Many aspects of the service are potentially vulnerable. Users have reported that their passwords were hacked. Google searches currently display websites instructing users how to hack passwords in the first few pages of search results. Hacked accounts can potentially lead to a wide range of problems, which may include social inappropriateness, crime, businesses negatively impacted, and more. What Examples Are There Of Recent Account Hack Risks? Security professionals believe that Instagram account users should better understand the specific security risks related to the use of this software. Many people sign up each day with no understanding of the various ways hackers can get into their account and use it for personal gain. Of course, Instagram advises users to create strong passwords. This is the first and most important step to prevent hackers from getting into your Instagram account. Below are a few tips on creating strong passwords: This: 378jsoTTkm84 NOT This: password1234 The password on the right would be cracked by hackers in less than one second. Here’s a website where you can check the strength of your passwords to see if they are good enough to fool hackers. Guess how long it would take to Bruteforce the password on the left? 33 centuries (Quite a long time). Below are a few more to try in the password checker: Account123: This password would be bruteforced in 21 minutes. Home1234: 5 minutes Car2233: 20 hours (better) Many people use their own name or their pet’s name with a series of numbers after it. These are usually very easy to crack as well. Charles1234: 3 minutes to crack Rover2323: 46 minutes (woof-woof!) Carol3434: 4 minutes Spot8888: 18 minutes Two-Step Authentication Two-step authentication is one of the best and simplest ways to provide your account with the high level of security it requires. You can go a step further and use biometric authentication. This solution uses your fingerprint and/or photo of your iris as a password to your account. New ways to protect users from hackers are constantly being created. Getting Lock Out Some users have been locked out of their accounts when hackers took control of them. This can be scary and infuriating. The Sun reported on an ‘epidemic’ hacking of Instagram that occurred when hackers in Russia took over many popular accounts, then changed the names and photos. Some users reported that it took them weeks to get their accounts back. They said that Instagram wasn’t very helpful so they had to do a lot of the work themselves. Despite improvements in security, hackers have increasingly been able to break into all types of software programs, social media platforms, email accounts, and even company databases There seems to be nowhere that hackers can’t go if they want to. They apparently have the tools, resources and backing to focus all their efforts on hacking day in and day out. Some of these hackers are sponsored by big governments like China and Russia. These countries have realized how much money there is in hacking and they seem to have no conscience about committing this crime. One good ransomware attack against your company could net thieves $30,000 or $40,000. Most people will pay the ransom to get their files back, though this doesn’t always ensure that you will. Instagram Security Improves Instagram security has been improving in a number of ways. They are now being upfront in the media about the hacking experiences their customers are enduring. They have stated that they will continue to dedicate themselves to addressing all reports of hacks. With each one, they will: Record all the details of what happened Examine the relevant security aspects Get the customer’s account restored as quickly as possible Improve the relevant software through updates Make or suggest any other improvements that could prevent the breach from occurring again Mashable Gets Hacked Too In a recent article, Mashable explained that some of their users were having the same experiences as those on Instagram. Hackers would break in, change the name on the account, change the photos and pretty much just take it over. Even contact information and profile image were changed, leaving account holders to scratch their heads. It’s a story being told more and more often. “It’s embarrassing and frustrating to feel so vulnerable,” said one Mashable patron. How Could My Account Be Hacked And What Resources Exist For Security? Users should be aware that accounts can be hacked by: A forgotten password hack Coding Phishing CheatDroid A range of third-party applications Conclusion UGTechMag is a good source of online guides and tips available to help protect users. It’s best for Instagram users to learn all they can about how to keep their account secure. Today, it takes a proactive approach. All over the world, hackers are working non-stop to find ways to hack into your computer, your network, your social media accounts, your email … whatever they can do to find personal information about you and use this to exploit you –