Google and Yahoo Irish Domains Hijacked

Google and Yahoo‘s Irish domains went offline on Tuesday, following an unauthorised change to their registrar’s account.  The domains and were Domain hijacked. Domain hijacking can be done in several ways, generally by social engineering.  The most common tactic used by a domain hijacker is...
Read More

Dell Launching Three New Touchscreen Windows 8 Computers

Dell revealed three new touch-enabled Windows 8 PCs designed for three different kinds of customers.  Shipping on October 26, 2012. XPS 12 Ultrabook / Tablet Hybrid – Price $1,199.99  – Specs are 12-inch display, 1920 x 1080 resolution, Intel Core i5 processor, 4GB of RAM, 128GB SSD and Intel HD 4000 graphics card.  Ultrabook/tablet...
Read More

5 Ways To Secure Cloud Computing

1. Secure data transfer – Always make sure you data is encrypted this is very important.  Always make sure your data is traveling over a secure encrypted and authenticated channel.  Always make sure to use FTP, SSH or SSL when transferring files. 2. Secure software interfaces...
Read More

Top 10 E-mail Scams

1.PayPal Account Needs Attention 2. Ebay account needs you to verify your bid 3. UPS Package needs to be delivered 4. You inherited large sum of money from foreign relative. 5. Lottery Winning Scams 6. Best Stock Tips 7. Mystery Shopper Wanted 8. Cheap Medication...
Read More

White House Security Breach

The White House has confirmed that one of its internal computer networks has been compromised.  A military office in charge of the president’s communications has been targeted in a successful spear phishing attack. For those of you that do not know what spear phishing is...
Read More

The Bourne Legacy Book Review

The Bourne Legacy published in 2004 is a spy fiction thriller written by Eric Van Lustbader. It is the fourth novel in the Jason Bourne series created by Robert Ludlum and the first to be written by Lustbader.  There was a movie released in August of...
Read More

Skype Dorkbot Worm

A malicious worms spreading through Skype called the Dorkbot Worm threatens to can take control of a victim’s machine and hold its contents for ransom. Using a social engineering attack displays a message The file being offered up is most commonly known as skype_02102012_image.exe. Running the file...
Read More

Backtrack Linux Review

BackTrack is a security-focused Ubuntu Linux based distribution that is loaded with all the best Free Software penetration testing applications available.  The latest edition is code-named Revolution, and the newest update release BackTrack 5 R3. The distro designed for penetration testers and other security professionals. ...
Read More

GhostShell Hacks 100 Major Universities

The hacker group GhostShell struck again late Monday with Project WestWind in which they leaked 120,000 records from 100 major universities around the world.  The hack was identified as a SQL breach.  Universities like University of Michigan New York University Princeton Harvard Cambridge Tokyo University...
Read More

Cyber Attacks on Financial Systems

Despite denying reports evidence has been found that since Sept. 19  Wells Fargo, JPMorgan Chase, Bank of America, Citigroup, and Bancorp being hit by a series of cyber-attacks that caused Internet blackouts and delays in online banking.  Customers of Bank of America JPMorgan Chase Citigroup U.S. Bank Wells Fargo PNC...
Read More


encryption main The Ultimate Guide To Encryption
phone water Key Tips On What To Do If You Drop Your Device In Water
phone business How to Streamline Your Business Operations with POS Systems
audible Audible on Android vs Audible on iOS
stamp Stamp App for Moving Playlists between Music Services

Tech Geek Today

Tech Geek Today


Subscribe To The Technology Geek