31478 Industrial Road Suite 200, Livonia, Michigan 48150 sales@xfer.com

XFER Blog

XFER Blog

XFER has been serving the Livonia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Botnets Go Mobile, Making the Internet Less Safe

b2ap3_thumbnail_botnet_dangerous_400.jpg
Hackers are notorious for exploiting technology for their benefit, but users often forget that mobile devices are exploited just as often as desktops and workstations; perhaps more so, due to their higher exposure to wireless networks that may not be secure. One of the greatest threats to mobile devices is the botnet, which is designed to enslave a device and have it turn on its owner (and the entire Internet).

0 Comments
Continue reading

Hacking Attacks Can Have Deadly Consequences

b2ap3_thumbnail_life_threatening_hack_400.jpg
We all know that hackers are never good news. All they want to do is ruin someone’s day by planting a threat in an innocent person’s PC or steal some data from a business. However, some hackers could potentially have much more dangerous (and deadly) agendas, like sabotaging hospital equipment.

0 Comments
Continue reading

Alert: How Hackers are Scamming Users With Fake IT Support Hotline

b2ap3_thumbnail_malware_lock_up_400.jpg
There’s a wicked string of malware on the Internet that locks users out of their browser and directs them to call a phone number. That phone number reaches hackers who have set up a subterfuge as an IT support company. If this happens to you, even if you are in the middle of something important, do not call the phone number.

0 Comments
Continue reading

Pay a Hacker Ransom Money and Risk Getting Bamboozled Twice

b2ap3_thumbnail_distributed_denial_of_service_400.jpg
Requesting a ransom from victims is an unfortunate trend gaining momentum in the hacking world. This is typically done using ransomware (where hackers encrypt data and request money for the key) and distributed denial of service attacks (where hackers threaten to overwhelm a system with traffic, thus knocking it offline). In both scenarios, hackers are looking for the victim to pay up, or else. Should they?

0 Comments
Continue reading

How a Nearby Hacker Can Access Your Phone Through Google Now and Siri

b2ap3_thumbnail_cell_phone_hack_400.jpg
These days, mobile exploits aren’t anything to be surprised about. Most people consider their smartphones to be more secure than their desktops or laptops, but the fact remains that there are just as many exploits, if not more, for mobile devices as there are for PCs. One of the latest mobile threats that can infiltrate your iPhone or Android device takes advantage of Siri and Google Now.

0 Comments
Continue reading

If a Teenager Can Hack the CIA, You Can Be Hacked Too!

b2ap3_thumbnail_cia_hacked_400.jpg
With new threats emerging all of the time, it’s no wonder that cybersecurity is such a major part of any technological endeavor. Your should be using the most powerful security solutions on the market in order to avoid intensive hacks. Despite the emphasis that our society places on security, it takes a high-notoriety hack to truly shake the public into action; for example, what if the Central Intelligence Agency were hacked by a teenager?

0 Comments
Continue reading

The Best Way to Protect Your Network is By Performing a Thorough Assessment

b2ap3_thumbnail_it_security_against_intrusion_400.jpg
As a business owner, you understand that there are always criminals on the lookout waiting to take advantage of the slightest crack in your defenses. They want to steal from you and see you fail. Cyber security is one of the most important avenues of defense your business should take advantage of, especially considering the fact that most threats to your organization aren’t apparent until it’s too late.

0 Comments
Continue reading

Despite Technology’s Shortcomings, People Are Still the Root of Hacking Attacks

b2ap3_thumbnail_pc_hack_attack_400.jpg
People often blame technology for not doing its job in the face of hacking attacks. While this is certainly true, only half of the fault lies with the technology. The other half, whether we like to admit or not, comes from the people using technology. This brings up an interesting ultimatum; only humans can prevent hacking attacks from happening altogether. If people don’t protect their data, it’s only natural that it will eventually get attacked.

0 Comments
Continue reading

A New Plan Might Make Software Reverse-Engineering Far More Difficult for Hackers

b2ap3_thumbnail_software_re-engineering_400.jpg
Hackers make life difficult for even the most innocent Internet user, and it’s all thanks to a nasty little trick called reverse-engineering. This is when a hacker picks apart the code that makes up a program, then scans it for vulnerabilities or exploitations. A new type of security measure is being developed to protect against the reverse-engineering of software.

0 Comments
Continue reading

How to Remove the Super Dangerous Superfish App from Your PC

b2ap3_thumbnail_superfish_two_400.jpg
As seen by the recent Superfish app debacle, software that comes preinstalled on a new PC shouldn’t always be trusted. Most of the time, the innate software on a device can be trusted; but the Superfish application is an exception. This app, which came preinstalled on new Lenovo PCs between the months of September and December of 2014, can potentially compromise the security of your machine.

0 Comments
Continue reading

DDoS Attacks Can Lead to a Lot More than an Overloaded Server

b2ap3_thumbnail_ddos_attacks_becoming_a_problem_400.jpg
We’ve mentioned distributed denial of service attacks (DDoS) before, and we’ve emphasized the importance of protecting yourself from threats which can cause downtime. However, we think the recent attacks by Lizard Squad take DDoS to an entirely new level.

0 Comments
Continue reading

The Darknet: The Illegal Tech Black Market in the Gutters of the Internet

b2ap3_thumbnail_darknet_gutters_of_the_internet_400.jpg
We’re so busy worrying about hackers that we rarely think about how they acquire the tools they need to steal you out of house and home. One reason that the surge of hacking activity has skyrocketed over the past few years is because hacking tools have become more readily available, through an illegal black market known as the Darknet.

0 Comments
Continue reading

Google Places Hacking Serves Up Catastrophe for DC Restaurant

b2ap3_thumbnail_misinformation_from_hacker_400.jpg
Last year, a Washington DC restaurant called the Serbian Crown was forced to close its doors to the public. Instead of chowing down on delicacies such as lion, horse, and kangaroo meat, customers can now only sink their teeth into disappointment. The reason? A nasty Google Maps hacker, and lack of brand management to help clean the mess up.

0 Comments
Continue reading

How to Protect Yourself from a Haunted Computer

b2ap3_thumbnail_halloween_pc_haunting_400.jpg
Naturally, if you saw your lamp levitate, you would believe it to be the work of a ghoul and you would cry out in terror. What then would you believe if you saw your PC’s cursor begin to move on its own? In a spooky scenario like this, your computer isn’t haunted. It’s hacked. In the real world, the latter is the scarier of the two.

0 Comments
Continue reading

Zero Trust: Is this a Wise Data Security Policy?

b2ap3_thumbnail_no_trust_data_protection_400.jpg
Sometimes it seems like the Internet is plotting against you, and nothing is safe, ever. Even if you don't have any thugs waiting to steal your data, there are hackers - thieves - who will steal it anyway, waiting to take it when you least expect it. One of the most secure ways to protect your company's digital assets is to enact a "zero trust" policy for your network.

0 Comments
Continue reading

Warning: Cryptowall 2.0 Ransomware is as Bad as They Come

b2ap3_thumbnail_ransomware_cryptowall_400.jpg
Be advised, there's a new digital threat on the scene that you and your employees need to be aware of. Known as Cryptowall 2.0, it's a wicked virus that has the potential to encrypt and steal your files, making it the scariest thing to hit your front door this Halloween season.

0 Comments
Continue reading

Russian “Sandworm” Hack Reveals 5-Year Cyber Espionage Campaign

b2ap3_thumbnail_watch_out_for_sandworms_400.jpg
A cyber espionage campaign called "Sandworm" has been discovered recently. The hacking attack, said to be based in Russia, has been targeting government leaders and organizations since as early as 2009. The researchers responsible for the discovery, iSight Partners, came to this conclusion after examining the code used in the campaign.

0 Comments
Continue reading

How Much Cash Can Hackers Cost Your Business?

b2ap3_thumbnail_costs_of_data_security_400.jpg
Crime might pay for those bold enough to do it, but that doesn't mean everyone should. Hackers likely don't take into account the fact that they are costing the world countless millions of dollars in damage only to further their own gain, and their influence can have far-reaching effects on people all over the world, let alone your business.

0 Comments
Continue reading

Is Your Antivirus Software Up to Snuff?

b2ap3_thumbnail_is_your_antivirus_working_for_you_400.jpg
All of the security breaches and vulnerabilities of 2014 sure have made for an interesting year; first Heartbleed, then the Internet Explorer vulnerability, GameOver Zeus, and the Russian password-stealing gang. In light of these events, you really have to ask the question, "how can we fight these threats?" Symantec has told The Wall Street Journal that they feel antivirus technology is "dead."

0 Comments
Continue reading

Escape the Phisherman’s Hook – 4 Tips to Get You off the Line

b2ap3_thumbnail_phishing_scams_400.jpg
The Internet is a vast ocean filled with all sorts of different creatures. Many are harmless, like the bottlenose dolphin, but once in a while you will encounter an aggressive shark. But no matter how powerful or intelligent these creatures are, they still wind up flopping around on the deck of some fisherman's boat. Why? Because fishermen know what they're looking for and how to capture it. The same can be said about Internet phishers.

0 Comments
Continue reading