Smart home networks are rapidly gaining popularity, but some security experts worry that not enough encryption controls are coming with the products. Security firm IOActive released an advisory (PDF) saying more than half a million Belkin WeMo devices are susceptible to widespread hacks. The firm uncovered several vulnerabilities in these devices, which would let hackers gain…
We're constantly reminded of the need for strong passwords, but not everybody is listening. How good (or not so good) is your own password behavior these days?It seems like everybody knows better about passwords, but not everybody behaves better. SplashData's list of the worst passwords of 2013 has given the easy-to-crack "123456" the crown as…
With all the options one has to choose from when it comes to data backup and disaster recovery, it can easily be an overwhelming process. Fortunately we here at Tech Experts break-down some of the industry standards and practices and why they are better choices than some of the offered services today.The idea of having…
What were the five most catastrophic computer viruses ever and how much damage did they cause?
The fact that the internet has become the backbone of modern society means that it has also become a prime target for hackers and crackers around the world. Find out here about the most prominent and catastrophic computer viruses…
Anyone who has used a computer in the last decade is more than likely to be familiar with Windows XP. It has been the most popular operating system (OS) for just shy of 13 years, and for good reason. It was quickly adopted because of its user friendly interface and reliability, and has a very loyal…
Facebook is a very popular social networking site, over 1 Billion users around the world use it. As with any online activity you are vulnerable to all types of attacks such as social engineering and phishing attacks to obtain your information. Thankfully Facebook and other social networking sites have improved their security features to prevent…
If you’ve logged into a secure website before, there's no doubt that you've encountered CAPTCHA. It’s the security feature that distorts words and numbers in an effort to thwart non-human users from accessing that site. Consider it a ‘prove you’re human’ test, and it just might be a lot less secure. Enter software company Vicarious,…
We've all suffered this inconvenience at least a dozen times in life; door locked, hands full and now the dreaded contortionist movements to retrieve your keys and manage to slide it in the lock. It’s a problem that has plagued the developed world, but alas no more.Enter the Kwikset Kevo. The dead-bolt door lock that…
KeePass and similar products like it will help users create strong passwords because it’s built into the program and the user doesn’t need to think about what characters to use and how to use them. The integrated Random Password Generator will allow users to define a specific set of password outputs. Another nice feature is…
Windows Firewall can protect your computer from many types of online attacks. Although it may not protect you from getting viruses or malware; it can protect your system from running an application that has not been specifically allowed by you as the user. Some may think that firewalls are a nuisance but it is a…
User Account Controls primary design goal was to help protect a Windows computer, Vista and later, from programs attempting to make a major change. When UAC is active it prompts the user and asks the user if the change is valid. The design goals of UAC have been achieved since by default it is enabled…
Checking for a publisher or developers digital signature is very important from a security standpoint. Downloading a file that has not been verified from a legitimate source may cause issues because the file may need a host to wreak havoc on. Even worse, an unverified program that has been installed can do a number of…