Tuesday, February 25, 2014

Mt.Gox Resigs...Bitcoins future doesn't look so bright.


The Bitcoin-trading website Mt.Gox was taken offline this past Monday. This puts millions of dollars at risk by investors who put invested in the digital currency.

The exchange deleted all of its tweets, and the CEO of Mt.Gox, Mark Karpeles resigned from the Bitcoin Foundation’s board of directors on Sunday.

Bitcoin investors are alarmed with the price down 3% to $490, its lowest level since November.
An unverified document called “Crisis Strategy Draft” is being circulated online states Mt.Gox has lost 744,408 of its users’ bitcoins, a net worth of $367 million.

There are rumors Mt.Gox has plans to re-brand itself as Gox.

Mt.Gox has been dealing with problems ever since the beginning of this year.  Feb. 7 Mt.Gox suspended withdrawals from its trading accounts.

The company found out there was a flaw with bitcoin transactions.

Bitcoin records transactions every 10 minutes, leaving a large window for malicious activity.  Attackers would make real transactions immediately posting fake ones, confusing the exchanges’ accounting programs.
This glitch was made public in 2011 but never addressed by the Bitcoin exchange.

Bitcoin dropped to $130 during this time, after it was trading for more than four times then that of other exchanges.

“The people running the systems right now are not necessarily business men,” Rose said. “For the most part, they’re people who came into this digital project without grasping the value or risk of it. The ecosystem is maturing, but it’s a little scary for everyone involved.”
– Charles Riley contributed reporting from Hong Kong. To top of page

What do you think their future of Bitcoin will turn out to be?  Please leave your comments below!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+.


Mt.Gox site disappears, Bitcoin future in doubt – CNN Money

Bitcoin is under attack – CNN Money

Monday, February 24, 2014

[Facebook Alert] Security Violations from Fake Facebook Messages

Facebook users need to be on ‘high alert’ because there are bogus Facebook messages from Facebook Security being displayed.

These messages are not coming from the real Facebook Security, they are phishing messages in the attempt to gain access to Facebook users accounts.

The Facebook messages look like this:


Another phishing message going around uses an authentic link to Facebook Security to make it appear more legit.

A red flag is the verification link to a third party Facebook application.

The scam sends users to an application similar to the one below:


The ploy is to direct users to an external website.  These sites are designed to look like Facebook, and most of the web addresses are easily recognized as not being Facebook.

Take a moment and verify that you are actually on Facebook.com before entering any login information or personal data.

Once a user enters in their Facebook information, the scammer has complete control over the account.

They can access personal information to steal their identity, send bogus messages to people in the friends list, send emails asking for money because they are in trouble, and send links to other scams to all the victim’s Friends.

If you feel like you have received a phishing message on your Facebook account, be sure to let your friends know this has happened.  They may be the next ones to become a victim.  Also, check your friends list and see if you have “Fącebooƙ Șeȼurity” listed as a friend.  If you do, you know you have been hacked!

Your Ultimate Guide to Facebook Scams and How to Deal with Them

How to spot a Facebook Survey Scam


[Phishing Alert] Fake Message from Facebook Security Stating You Violated a Policy – Facebook Crooks

Thursday, February 20, 2014

PayPal Transaction Declined Phishing Scam

Another phishing scam is out, an email claiming to come from PayPal stating that a transaction was declined because of recent activity on the recipient’s account seems to be unusual.
The email guides users to reprocess their payment with an attached file form to confirm account information.
The email looks like this:

Subject: Your transaction was declined
Recently, there’s been activity in your account that seems unusual compared to your normal activities. We’re concerned that someone is using your PayPal account without your knowledge.
Recent activity on your account seems to have occurred from a suspicious location or under circumstances that may be different to usual.
What to do ? The best way to resolve this and avoid it happening again is to confirm information you provided when you created your account to make sure that you’re the account holder . You can do that now.
The secure way to confirm your account information:
1. Download the attached Document.
2. Open the document in a browser window secure.
3. Follow the instructions to Confirm that you are the account holder.
Yours sincerely, PayPal


The email has PayPal’s logo and is professionally formatted so it gives the illusion of being genuine.
The email explains that, in order to fix this issue, the recipient must open an attached file and fill in a form the confirms the information provided to the account.
This phishing scam, steals PayPal login information with personal and financial details.
For those who do open the attached file, the login page closely mimics the real PayPal website.
After the user enters their login information, they are taken to a second page that asks for their personal contact information.
The fake forms even run a php error check to ensure the victims have input the correct types of data.
If you receive a PayPal phishing scam, please submit it to the company for analysis.  Go directly to the PayPal website and submit a claim.
It’s good to keep in mind, PayPal emails ALWAYS address you by your first and last name or business name.  They will never send you an email with a generic greeting such as ‘Dear Customer’.

PayPal ‘Your Transaction was Declined’ Phishing Scam – Hoax-Slayer

Wednesday, February 19, 2014

The Future of Bitcoin


Bitcoin became  very popular in 2013, when the value of a single unit of virtual currency rose from $13 to more than $1000 in a year.

Travelers began using Bitcoins while touring the world when a they noticed a Bitcoin ATM appeared in a Vancouver coffee shop.  The U.S. Senate committee held hearings at which regulators supported Bitcoin and other virtual currencies.

Bitcoin ATM’s are now among British Columbia, Canada, Hong Kong, Europe and Asia, with talk about one in the U.S..

Bitcoin is not issued or backed by a government or a business, it runs on computer code on a decentralized network.

Businesses like Overstock.com and some Subway shops have started to accept Bitcoin, although, it is still not a universal exchange.


Why worry?

Economists are skeptical of Bitcoin’s power because it lacks attributes of a useful currency.  Money serves three purposes: functions as a medium of exchange, a unit of account, and a store of value.

The digital crypto-currency has been in major headlines for a while now.  This week Bitcoin collapsed in the market.

Anonymous owners of black-market website Silk Road announced that hackers stole $2.7 million worth of Bitcoin.  Exchange was halted to ensure the safety of customer funds.  Also, Mt.Gox, one of the world’s largest bitcoin exchange, said it would temporarily prevent customers from removing their bitcoins from its online exchange.  Investors are speculating that Mt.Gox may be on the verge of bankruptcy.

Bitcoin prices have plunged dramatically on Gox, see that the price of bitcoin on Bitstamp was $640 and $250 on Gox.

Bitcoin currency has been linked with payments of underground websites that deal with drugs, weapons and other illegal merchandise.

Since Bitcoin doesn’t have a currency characteristic, it cannot be deposited in the bank.  It is held in ‘digital wallets’ that have proven to be vulnerable to thieves and hackers.

Lenders will not use bitcoins as a unit of account for consumer credit, auto loans, mortgages, or other credit.


Bitcoins future is wobbly, there are many reason why this new technology will disrupt our economy, good or bad:
  • Bitcoin is evolutionary, the currency cannot exist without a computer
  • Transactions are not overseen by the government, notary, or bank
  • Bitcoin protocol flips automation upside down
  • The Distributed Autonomous Corporation (DAC) may turn technological unemployment into structural unemployment
Bitcoin is in its infancy, the tranactions are untraceable and supposedly tamper-proof.  This could result in the government losing control in the economic marketplace.

“[Imagine] a group of generals of the Byzantine army camped with their troops around an enemy city. Communicating only by messenger, the generals must agree upon a common battle plan. However, one or more of them may be traitors who will try to confuse the others. The problem is to find an algorithm to ensure that the loyal generals will reach agreement.”

Bitcoin is pseudonymous, not anonymous, it isn’t visible, although, it is possible to copy, print, and share the codes.

Along with Bitcoin, Mastercoin and Ripple have arisen.  They are comparable crypto-currencies with an open source project that will add features to the Bitcoin block chain.

The Bitcoin block chain offers a platform that isn’t controlled by anyone.  All can participate and the system cannot be manipulated by governments, corporations, or bankers.



Bitcoin is capitalism 2.0!

The future will no longer be centralized!  Democratization is the transfer of power from the elite to the crowd.
Bitcoin is the third democratization.

1st the Internet, it enabled the democratization of information.

2nd democratization with 3D printing, manufacturing where factories become obsolete.

3rd is democratization of money and finance.  No more monopolies that control our money and business.
The currency application of Bitcoin was version 1.0.  The block chain of Bitcion is 2.0 = CAPITALISM

These companies will try to preserve the problem to which they where once the solution. But the dramatic changes in business will unearth a major gap between traditional approaches to strategy and the way the real world will work. It is the end of competitive advantage as we know it.

This continuing trend of Big Business may lead to more than 70% of the 1000 Fortune companies to be replaced.

Countries, nations, bankers, stock brokers, insurance companies, and notaries are all going to be heavily affected.

What do you think the future of Bitcoin will bring?  Please leave your comments below!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+.


Bitcoin: It’s the platform, not the currency, stupid! – The Next Web

Bitcoin Lacks the Properties of a Real Currency – MIT Technology Review

Bitcoin Exchange Prices Plummet as Investors Brace for Bankruptcy – WIRED

Bitcoin Exchange Bitstamp Halts Withdrawals Citing Denial Of Service Attack – Tech Crunch

Friday, February 14, 2014

How to recognize and avoid spyware


The term “spyware” doesn’t mean an undercover operative is watching you.  Spyware also known as “adware” refers to a type of software that sends you pop-up ads when installed on your computer.

Some versions of spyware track your websites and tracks exactly what keys you type.  This is used for malicious purposes.

Spyware will cause your computer to run slow and sluggish.  There are also other privacy indications to be aware of.

Spyware monitors your websites visited, and redirects your browser to choice websites.

Here are some tips and warning signs to look out for on your computer:
  • endless pop-up windows on your browsers
  • you are being redirected to web sites other than the one you typed into your browser
  • new, unexpected toolbars appear in your web browser that you can’t get rid of
  • new, unexpected icons appear in the task tray at the bottom of your screen
  • your browser’s home page has been respectively changed
  • the search engine your browser opens when you click “search” has been changed
  • certain keys fail to work in your browser (e.g., the tab key doesn’t work when you are moving to the next field within a form)
  • random Windows error messages begin to appear
  • your computer suddenly seems very slow when opening programs or processing tasks (saving files, etc.)



How can you prevent spyware from installing on your computer?

To avoid unintentionally installing it yourself, follow these good security practices:
  • Don’t click on links in the pop-up windows – Pop-up windows are often spyware, clicking on the window may install spyware software on your computer. To close the pop-up window, click on the “X” icon in the titlebar instead of a “close” link within the window.
  • Choose “no” when asked questions – Don’t trust unexpected dialog boxes asking whether you want to run a certain program or perform another type of task. Always select to close or “cancel,”  the dialog box by clicking the “X” icon in the titlebar.
  • Free downloadable software is not free – Websites offer customized toolbars and other features that appeal to users. Don’t download programs from sites you don’t trust. You should realize that you may be exposing your computer to spyware by downloading these programs.
  • Don’t follow email links claiming to offer anti-spyware software – Like email viruses, the links may serve the opposite purpose and actually install the spyware it claims to be eliminating.


Do you think you have spyware?  Here are steps to take to remove spyware from your computer.

  • First run a anti-virus scan on your computer – Some anti-virus software will grab and remove spyware from your computer.  It is a good idea to set your anti-virus software to run scans periodically.
  • Run a legitimate product specifically designed to remove spyware - Products will scan your computer for spyware and remove and destroy it.  Many popular products include Lavasoft’s Ad-Aware, Webroot’s SpySweeper, Microsoft’s Window Defender, and Spybot Search and Destroy.
  • Be sure your anti-virus and anti-spyware software are compatible - An approach to installing the software is to ensure you don’t unintentionally introduce problems.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+.


Security Tip (ST04-016) Recognizing and Avoiding Spyware – US-CERT

Tuesday, February 11, 2014

Happy Safer Internet Day 2014!


Safer Internet Day (SID) has been organized by Insafe each year to promote safer and more responsible use of online technology and mobile phones.

This day is particularly geared towards children and young adults to encourage awareness with Internet usage. Today, February 11,2014 is Safer Internet Day 2014. "Lets create a better Internet together". safer-day
Social cruelty is a growing problem both in schools and outside of schools online and off. In a presentation given at the International Bullying Prevention Association conference by Aidan McDaniel, a student activist said, "its everybody's problem" and the solution doesn't happen "without working with each other." Aidan spoke sparingly about how he and other students train peers to mentor younger students in bullying prevention.


The Professors Professors Sameer Hinduja and Justin Patchin, who run the Cyberbullying Research Center, say that "everyone is looking for an answer to the bullying and cyber-bullying problem." Safer Internet Day is now celebrated in more than 100 countries and with its theme for this year ("Let's create a safer Internet together") SID is modeling what both activists and researchers have long been saying: that safety and wellbeing on this planet's increasingly social, user-driven internet require - by definition - a social, collaborative solution.


You can go onto the SID website and learn how to get involved.

Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest computer security threats.


Safer Internet Day Website

Monday, February 10, 2014

The Industry’s Fastest Next-Generation Firewall


PA-7050 is the Fastest Next-Generation Firewall that Delivers Exceptional Performance

With the next-generation firewall, IPS, AV and WildFire active on all traffic, the PA-7050 brings performance at speeds with higher than alternative offerings.

This performance has superior consistency and gives organizations high network performance with next-generation firewall security.


Data traveling across enterprise networks are growing at a rapid rate, and enterprises need to ensure that data moves as fast as possible to maintain business productivity. The object is to apply security throughout the network to protect against sophisticated cyber attacks. The attacks hide in plain sight, while using routine applications to penetrate exterior defenses.


When inside the network, the attack acts like regular traffic while stealing targeted data via applications like FTP, webmail or cloaked within SSL. Most firewalls use a simple signature-based protection mechanisms masked as next-generation firewalls.

Signature-based protection mechanisms masked as next-generation firewalls cannot safely enable applications. They will block them, but cannot deliver sufficient performance with the security threats enabled. Palo Alto Networks addresses the challenge head-on with the PA-7050, a dynamic, easy-to-extend and manage next-generation firewall that is designed from the ground up to deliver performance consistency with next-generation security controls enabled.

This inception, set gold standards for high performance next-generation firewall that is structured from the ground up. This protects digital assets by identifying and enabling all applications, including those encrypted with SSL while blocking unknown threats. The PA-7050 is suited for:

  • Data centers with threat prevention at 100Gbps or more
  • Internet gateway where visibility and control over all application and protection from all critical threats
  • Internal network segments, where isolation of critical data and business functions are required

Palo Alto Networks is leading a new era of cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats.

The security platform enables business operations and delivers protection based on what matters most in today's computing environments of applications, users and content.

 Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+.  


 Palo Alto Networks Launches the Industry’s Fastest Next-Generation Firewall http://www.redorbit.com/news/technology/1113067382/palo-alto-networks-launches-the-industrys-fastest.../

PA-7050: The Industry’s Fastest Next-Generation Firewall - Palo Alto Research Center Blog http://researchcenter.paloaltonetworks.com/2014/02/introducing-pa-7050-industrys-fastest-next-generation-firewall/

Friday, February 7, 2014

Microsoft plans for a short patch before XP ends.


Microsoft announced they will be issuing five security updates next week, with two being tagged as “critical.”
Three of the four updates for Windows will affect Windows XP, the 13-year-old operating system that Microsoft will retire from patching support on April 8, 2014.

Microsoft will have two more rounds of security updates before it pulls the plug on Windows XP.

Another two Windows updates pertaining to XP, were rated as “important” on Microsoft’s four-step scoring system.

  1. Used by attackers to obtain additional access
  2. Used to take personal data from the compromised PC

Forefront Protection 2010 was one of the products that Microsoft terminated in December 2012.  Even though development halted, Microsoft promised to keep patching the program and delivering new signatures.  This includes, the fingerprint-like components that identify new malware or spam until 2015.

Security experts are interested in what Microsoft is not going to patch next Tuesday, that was said was going to be fixed.


The idea was dismissed that Microsoft had run out of bugs to fix in IE, according to Web metrics.  Net Applications used by more of the world’s online population than any other, has a user share of 58.2%.

With the lack of IE updates, Microsoft’s security and patching teams have decided to take a vacation.

Microsoft will have another chance to patch bugs in IE before the Pwn2Own hacking contest.  Pwn2Own is co-sponsored by Hewlett-Packard and Google, plans to give $100,000 to the first researcher or team of researchers that are able to compromise IE11 on Windows 8.1-powered PC.  A $150,00 award awaits for the first to hack the same setup when protected by Microsoft’s Enhanced Mitigation Experience Toolkit (EMET), a utility that manually enables anti-exploit technologies.

For a short time, Microsoft will secure XP, but it is ending very soon.  This is a great time to upgrade your system.  Please visit our online store and create an account to get the best deals on hardware and software.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+


Microsoft fixes critical Windows flaws on Patch Tuesday – PC Pro

Microsoft plans another short patch slate for next week, but finds a few XP bugs to crush – ComputerWorld

Thursday, February 6, 2014

Rackspace open door for open-source development


Rackspace is one of the few companies that takes open source software to an extreme.  Van Lindberg, Rackspace’s VP of Intellectual Property (IP), announced that Rackspace employees, Rackers, can “contribute to a project that is directly competitive with Rackspace.

So if a ‘Racker’ decides to devote to Apache CloudStack, they can directly contribute to the project without question.
“This new policy will drive business opportunities for Rackspace and build leadership and expertise in our Rackers, also forcing us to focus on the services we pride ourselves on delivering.” – Van Lindberg
Rackspace has always been vocal about its commitment with the open cloud.  Now they are giving its’ employees the same benefits they offer to their corporate customers.  Free access to the marketplace of ideas and an open door to building on the innovations of others.

Lindberg stated that the company is changing its policy so that “Rackers are free to contribute and participate in any public open source project of their choice that has an established open-source license.”


In the past, Rackspace’s policy was that they had to check with the IP Committee/legal department prior to contributing.

To encourage the sharing and collaboration by contributing to open source projects, Rackers will be focusing on the services they deliver.

This new policy does have a couple discrepancies:
  1. Rackers are encouraged to contribute on their own time, they can contribute during work hours but must first get approval from their manager.
  2. If a Racker would like to contribute to a project that is competitive with Rackspace, they would like to know exactly why before anything is contributed.
Along with the collaboration and sharing, they can contribute to code, patches, tests, and documents even during work hours.

This will bring a closer more productive partnership, that builds leadership and expertise to the Rackers.
What do you think about this new policy?  Please give us your thoughts in the comments below!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Rackspace’s Policy On Contributing To Open Source – Rackspace Blog

Rackspace opens the door wide for open-source development – ZDNet

Wednesday, February 5, 2014

Supersize your cloud storage to 100GB

Cloud storage services sync files and folders across multiple PCs and mobile devices. The rapid rise of cloud storage like Dropbox, SugarSync, and Google Drive create a bulletproof backup system.

You can actually build your own supercloud with more than 100GB of free storage.

Most services offer free accounts for cloud storage. With some patience, you can build your own supercloud, and with help from your friends.

To Get Started

Setting up your own personal supercloud is a tedious task, the first step is to take all of the services dedicated to areas in the Favorites column of Windows Explorer.


Amazon Cloud Drive: 5GB
Box: 5GB (but read “Beyond referrals” below before installing Box, as you may want to postpone installing this one)
Dropbox: 2GB
Google Drive: 5GB
MiMedia (m)Drive: 7GB
SkyDrive: 7GB (longtime SkyDrive users may be eligible for 25GB free)
SpiderOak: 2GB

Storage subtotal to this point: 33GB

Install SugarSync, they will offer you 5GB free to start.  Then install two cloud services that use a desktop app to sync and store files instead of creating a folder in Windows.

MediaFire: 10GB
Ubuntu One: 5GB

Storage subtotal to this point: 53GB

Refer your friends to get more storage

Many cloud services offer extra storage in 500MB increments for every friend that you refer to them.  Dropbox lets you add up to 16GB via referals, while Ubuntu One gives 20GB of extra space, and SugarSync allows up to 32GB of storage in half-gig increments.


MiMedia and SpiderOak offers an additional 1GB in storage, maxing out at 10GB and 32GB.


More than a referral

Another way to increase the amount of free Dropbox storage is to install the Dropbox app.  This authorized automatic photo uploads from your device, freeing 500MB  to your account.

Dropbox also gives you 250MB of free space for completing its Getting Started tutorial.

SugarSync gives user a couple ways to obtain extra free storage in 125MB chunks:
  • Install the mobile app for Android, BlackBerry, or iOS
  • Share a file or folder with a public or private link
  • Upload a file to your account via email
MediaFire gives you 2GB for installing the MediaFire desktop, and 2GB more for installing mobile apps.

By connecting your Facebook and Twitter accounts to MediaFire, you receive another 1GB for each.

Box offers 50GB free storage to new users, then by allowing Facebook to follow, you get another 50GB.

Microsoft offers 20GB of SkyDrive storage to their Office 365 Home Premium subscribers.

By referring Box, Google, and Microsoft to your social media accounts, you can get another 126GB of free cloud storage.

Sharing and Syncing

Once you’ve loaded up on all that storage, Dropbox should be able to help you with file syncing.  SugarSync also lets you choose specific folders to sync to.

Sensitive folders should be managed with SpiderOak and other less sensitive material can be send to Mega.

Online collaboration, streaming media, and choosing the right application to backup to will help you make the most of your space and easily manage your cloud services.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Supersize your free cloud storage to 100GB or more – PCWorld

Tuesday, February 4, 2014

Facebook’s 10th Anniversary Celebration - Creates You A Personal Video

Facebook has created a personalized video to celebrate their 10th anniversary. Zuckerberg & Co. decided a "Look Back" compilation of your most-liked photos set to music would be fitting for the anniversary.

 A notification will be sent to your account pointing to a video will be waiting for you.

Go to https://facebook.com/lookback/ to find your facebook moments made into a timeless memory video montage.

 References: Facebook Made You a Sentimental Video to Celebrate Its 10th Birthday - Gizmodo http://gizmodo.com/facebooks-made-you-a-sentimental-video-to-celebrate-it...

Signs you’ve been hacked

Today, antivirus software gives you peace of mind from scammers.  Although, anti-malware scans can be inaccurate.  So how are we supposed to know if we are hacked?

System monitoring and network traffic detection can help monitor malware, but may often fail on a regular basis.

In this blog, I will give you the signs to look out for, to know if you’ve been hacked.  Also, instructions on what needs to be done after you’ve found out your system has been compromised.

Reformatting your computer and restoring all the programs and its data is the old way of taking care of this problem.  Today, depending on your operating system, it might mean to simply click on a Restore button.
No matter what, a compromised computer can never be fully trusted again.

Here are a list of steps to take if your system has been infected:

Fake antivirus message

Fake antivirus warning messages are the surest signs that your system has been compromised.  But how are you supposed to know what messages are real or fake?

By the time people see the “Virus Detection” message, damage has already been done.  If you click the No or Cancel to stop the fake virus scan, it may likely be too late.


Your system has most probably been compromised.  The malicious software has already made use of unpatched software.

Malicious programs put out an “antivirus warning” because the fake scan is a lure you to buy their product.  By clicking on the links, you are more involved in the process of “fixing” the problem.  Then for a small fee, the antivirus software will clean your system resulting in your credit card number put in the hands of cyber criminals.

What to do:  As soon as you notice the antivirus warning, power down your computer.  Boot your computer system in Safe Mode, No Networking and try to uninstall the newly installed software.  Then restore your system.

Unwanted browser toolbars


This is one of the most common signs of exploitation.  If you experience a sudden change with multiple toolbars in your browser your computer may be infected.

What to do:  Remove any toolbars you don’t need and don’t remember installing.  Try and reset your browser back to its default settings.  If the toolbar didn’t show a Licensing Agreement, then it is most likely malicious.

Redirected Internet searches

Hackers will redirect your browser to a site that you didn’t intend on going to.  They get paid for the clicks to the malicious re-directed websites.

If you go to an Internet search engine and type in common words related to what you are looking for, look to see if you get the same results.  Many times the redirected Internet searches are well hidden from the user through proxies.  The bogus results are never returned to alert the user.  Usually if you have unwanted toolbar issues then you also have redirect problems.

What to do:  Remove the bogus toolbars and programs is usually enough to get rid of the malicious redirection.

Frequent random popups


Companies pay search engines to track your searches in order to tailor advertisements to your interests.  But if you’re getting random browser pop-ups from websites that don’t normally generate them, or of products that you’ve never looked at before, your system has probably been compromised.

What to do:  Random popups are also from bogus toolbars.  Uninstall the toolbars and restore your system back to its default settings.

Your friends receive fake emails from your email account

Even though this is a common problem, it is a security risk.  Malicious emails sent to friends from your address book compromises your account and all your friends’ accounts.

What to do:  Run a complete antivirus scan and change your email password.  Also you should contact your friends in your address book and notify them of the situation.

Have you seen these signs of a compromised computer?  Did you uninstall the malicious programs or reset your system to its default settings?  Let us know your experience below!

Don’t miss out on the latest tech news and computer security alerts!  Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

11 sure signs you’ve been hacked – TechWorld

Monday, February 3, 2014

How Cloud Computing Can Reduce your HR Burden in 2014

Cloud Computing

A cloud-based system can tremendously improve your HR work efficiency.  From paperwork organization, to requests and approvals, the cloud will keep your information current and up-to-date.

Already in the cloud?

Some businesses may not be in ‘The Cloud’ yet, but over 75% of businesses are either already in the cloud or looking to move into it.  Some businesses don’t know what ‘The Cloud is, but are already using it.

If you are a Facebook, Twitter, or an online shopper, you are actually more familiar to the cloud than you already know. They are all using cloud computing.  HR is moving to the cloud for instant access and its easy to use service.

So you’re probably wondering how The Cloud can reduce your HR burden in 2014?

Benefits of the cloud

The key benefits of using a cloud HR solution for a small business is that there is no need for pricy installments.  There are monthly subscription payments that are more affordable for small and thriving companies.


Moving your HR processes to the cloud gives your organization greater agility, utilizing the latest technology without any major changes to your infrastructure.  Using SaaS will reduce your cost and allows you to pay for what you need.

Using cloud HR can simplify workflows, reduce extra costs and enhance the way information is reported.  This enables HR staff to spend their time much more proactively with the support needed.

This is how the cloud will help you become more efficient at work:
  • No more wall-planners, paper forms and complicated Excel spreadsheets: Seamless electronic data capture eliminates paperwork and re-keying.
  • Self-service eliminates the paperwork involved with basic HR processes, allowing employees to request absence, update key personal information and request training.
  • Full view of HR data: From salary, accident, and injury, all records stored electronically in the cloud can be accessed easily and searched within seconds.
Please visit our Services page to see how we can help you migrate to The Cloud!

Are you already in the cloud?  Please share with us your experience, we would like to know what you think!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

How cloud-based systems can reduce your HR burden in 2014 – Cloud Computing Tech News

Lenovo’s Game Changer: Partnering with Motorola


The PC maker Lenovo, gets a global brand of smartphones, Motorola.  
It’s confirmed that Google sold Motorola Mobility to the Chinese PC maker Lenovo, this past week.

Lenovo purchased Motorola for $2.91 billion, consisting of $660 million cash and $750 million in Lenovo shares.  This left a remaining $1.5 billion paid in the form of a three-year promissory note.

Lenovo picked up the Motorola brand, as well as its portfolio of devices, including both Moto X and Moto G.

Lenovo will receive more than 2,000 patent assets, while Google will still control the lion’s share of patents it originally obtained when it acquired Motorola several years ago.

This deal gives Lenovo a thriving market for smartphones in China and other countries.

“This is a big game changer for corporate customers who can now standardize on Lenovo from smartphones to PCs to servers,” said Ira Grossman, CTO of end-user and mobile computing at national solution provider MCPc, whose Anyplace Workspace is centered on providing anyplace, anytime, anywhere computing to corporations. “Lenovo is moving full throttle into the smartphone market. Lenovo wants to own the end point whether it’s smartphones, tablets, laptops, desktops and probably wearables too. Lenovo has it all now. They are building a compelling story with a multi-operating system, diverse form-factor strategy”.

This blockbuster deal came only a week after Lenovo agreed to quire IBM’s x86 server business for $2.3 billion.  The China-based computing giant followed up with the agreement and identified it into four different groups: enterprise servers, mobile, ThinkPad branded PCs and cloud services.

Entering the smartphone field for Lenovo is a bold move.  They will definitely have to “up their game” but it shouldn’t be hard considering their proven track record of successfully embracing innovative ideas.

A Troubled Business

The Motorola handset has always been a stress point between Google and its partners.  Google has said its maintained a division between its Android group and the Motorola unit.  Other vendors have also express their irritation with the partnership as a competitor.

In the last year, Motorola has suffered many losses.  Motorola acknowledged the operating system loss of $248 million, which was much more than the year prior.

The deal is still a surprise, seeing Google has been pushing to move more toward hardware with the Google Glass headset and its Chromecast media dongle.

Gaining A Brand

Lenovo may be jumping into the smartphone field with high ambitions, but the Motorola smartphone is largely limited to China.  Even though the market has ranked No. 5 among global smartphone vendors in the fourth quarter.

Lenovo’s CEO said in May 2013 that their new smartphones were to be brought into the US within a year, but there has been no update since.

Lenovo also bought out the PC business of IBM in 2005, a very similar move to the Motorola buy out from Google.

“Lenovo intends to keep Motorola’s distinct brand identity–just as they did when they acquired ThinkPad from IBM in 2005,” Google CEO Larry Page said in a statement.

There are reports Lenovo attempted to purchase BlackBerry, but the deal didn’t go through because of regulators sensitive to a Chinese company owning phones extensively used by the Chinese government.

Sometimes we think of China as inflexible and harsh, but Lenovo has been able to adapt in most brands and geographies.

The CEO of Motorola Mobility Dennis Woodside said he sees the deal as putting the mobility unit on a “rapid path to achieving our goal of reaching the next 100 million people with the mobile Internet.  With the recent launches of Moto X and Moto G, there is a tremendous amount of momentum running alongside Lenovo’s hardware expertise and global reach.

Do you think Lenovo made a smart move buying out Motorola?  Will Google regret selling Motorola to Lenovo?  Let us know your thoughts below!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Partners: Lenovo’s $2.91 Billion Acquisition Of Motorola Mobility Is A Game Changer – CRN

Google sells Motorola unit to Lenovo for $2.9B – C|Net