ET&T

Tips and Tools Blog

New Virus Poses As Dropbox Invoice

Dropbox is no stranger to hacking attacks, and in recent months, they’ve been made a target once again. In this instance, hackers have launched a phishing campaign aimed at Dropbox users. They ...

SSD Drives Are Becoming The Standard For Laptops

Since their initial release, the smart money has been betting on the idea that SSD (Solid State Drives) would ultimately replace the aging, conventional hard drive as the storage medium of choice, ...

Need A Bank Account? Take A Selfie

Banks are embracing technology in new and innovative ways, or at least, some of them are. One of the biggest headaches and hassles of dealing with a bank comes when you want ...

Running Linux? You May Be Next For A Ransomware Attack

Typically, people running some flavor of Linux have little to fear from the hacking community. By and large, Linux users have been ignored or passed by in favor of other targets. Unfortunately, ...

iOS Users: Apple Says Update Immediately

There is a large and growing body of evidence that hackers and their attacks are increasing in sophistication. Hardly a month goes by that there isn’t a headline somewhere in the world ...

Samsung Phones Recalled Due To Battery Issue

Consumer electronics giant Samsung just released its latest update to its flagship product, the Galaxy Note 7, two weeks ago, as of the writing of this piece. The company has sold some ...

Redis Database May Open Door To Ransomware Attack

As you probably know by now, ransomware is a particularly insidious form of hacking attack whereby a target computer’s files are locked or held hostage in some way, and besides restoring from ...

Single Hacker Convicted For Over 2 Million US Credit Card Thefts

The story of the fall of the hacker going by the alias “Track2” is an absolutely riveting one. Track2, whose real name is Roman Valerevich Seleznev, is a thirty-one year old from ...

Malware On Your Mac May Be Caused By BitTorrent Client

If you’re a Mac user who downloads files using the torrent software called “Transmission,” you may want to check your machine for signs of infection. It was recently discovered that a malicious ...

Your Keystrokes May Be Stolen Through WiFi

There have been papers written and demonstrations conducted in recent months to show how it’s possible to wirelessly log your keystrokes. All of those demonstrations have relied upon specialized gear you can ...

Contact

ET&TET&T Logo $$$

Cyber Ninja Tips

Join our Cyber Ninja Tips Email List to receive the latest technology news and special offers.


Social Media

  • Facebook
  • Twitter
  • LinkedIn
  • Google Plus
  • RSS