Tips and Tools Blog

HIPAA Violations Are Turning Into Prison Sentences For Some

The unfortunate reality is that most instances of hacking occur from within a company itself. It’s true that the high profile cases that make the news are successful breaches from outside the ...

Hackers Can Now Change What You See On Your Monitor

Do you trust what your eyes tell you? If you’re looking at a computer monitor, that trust might be misplaced. At a recent DEFCON presentation in Las Vegas, researchers demonstrated how it’s ...

ET&T Ranks in the Lehigh Valley's Top 100 Private Companies

We are honored to have made the List of the Top 100 Private Companies in Lehigh Valley, Pennsylvania. Thank You to our Loyal ...

Oracle Micros Point of Sale Customers Reset Your Passwords

Does your company rely on Oracle Systems’ Micros to handle point of sale transactions? If so, you should change your password immediately. The company has recently reported that a sophisticated Russian cybercrime ...

New Bluetooth Is Coming And It Sounds Awesome

In late 2016 or early 2017, Bluetooth 5.0 will be released, and by all indications, this will be the version of the technology we’ve all been waiting for. It’s about to take ...

The WiFi of the Future May Consume Much Less Power

Battery life for mobile devices is their single biggest weakness. The greatest challenge in growing and managing the exploding “Internet of Things” isn’t the devices themselves, but rather, the power required to ...

Many Android Phones May Be Vulnerable To QuadRoot Hack

Security researchers from Check Point have unearthed a new vulnerability dubbed QuadRoot that leaves potentially 900 million or more Android-based smartphones vulnerable. The attack manifests when a user unwittingly installs specially designed ...

Frequent Password Changes May Compromise Security

By now, it’s a familiar story. Conventional wisdom holds that you want to use a different password on every site or service you log into and that you want to change your ...

Ransom Hackers Are Targeting iPhone Users

Ransomware has made some inroads into the realm of smart devices, but until quite recently, Android devices were the target of choice. That seems to be changing now. Increasingly, we’re seeing iPhone ...

Your Microsoft Account Credentials May Be Vulnerable

In fact, your Microsoft Account Credentials are almost certainly vulnerable, but until the rise in popularity of Windows 10, it hasn’t been nearly as big an issue as it is today. The ...

Contact

ET&TET&T Logo $$$ Contact Us

Social Media

Cyber Ninja Tips

Join our Cyber Ninja Tips Email List to receive the latest technology news and special offers.