Network In Review: Online Payments Made Safer Through 1Password

Network In Review: Online Payments Made Safer Through 1Password

‘1Password’ and ‘Privacy.com’ partner to make virtual card creation right from the browser a walk in the park. This is a highly effective way to protect yourself and your money against data breaches and card skimmers. The “burner” cards created through this integration are locked to a single platform and have spending limits. Paying online using your credit card is the least safe method one can pick. Most e-commerce websites request the user to input their credit card number, holder name, expiration date, and the CVV (verification code) on the back for payment safety reasons.

However, giving away these details can compromise them in at least two ways.…

read more

TEK On The Street: YouTube, AI, And Age Restrictions Unify Attempt

Anyone young enough to have had access to the internet while underage has been there. A website asks you to confirm your age to access its content, and you enter something fake just to get in. There’s nothing to check and confirm this declaration, so this step is really typical.

The situation gets even worse if the content itself is not marked with the right age-restriction tag, which in YouTube right now is solely a matter of the video uploader.

age restriction
YouTube is looking to solve both of these problems. For the tags, it’s planning to use machine learning to figure out which videos are inappropriate for the younger audience out there and mark them accordingly.
read more

Network In Review: What Is DNS Cache Poisoning And How Can You Protect Yourself?

Threat actors never rest and are always looking for new ways in which to target users and the companies that provide services to them. Some of the exploits they use are based on the fundamental mechanics of how the modern web works, which is exactly where DNS cache poisoning and spoofing come into play. These are insidious subversions of the normal web’s operation, and it can be hard even to know that you’ve been hit! So let’s take a few minutes to learn what these attack methods entail and what you can do to minimize your risk.

What Is DNS?

DNS is short for Domain Name System.…

read more

TEK On The Street: Are Curved Monitors Good for Office Work?

Curved monitors are no longer a novelty in 2020, and neither are ultrawides that push the boundaries in terms of diagonal size. In fact, you can get a curved monitor for a very low price if you are not aiming too high in terms of resolution or refresh rate.

But what are they actually good for? We can all agree that a higher resolution makes for sharper images and that having a higher refresh rate makes the action appear smoother in video games. On the other hand, opinions are split on what curved monitors bring to the table in terms of real-world benefits.…

read more

TEK On The Street: What To Look For In Monitors That Can Protect You From Eye Strain in 2020

Office work already comes with quite a few health risks, such as the fact that you spend many hours sitting down, which is not great for your back, among other things. On top of that, staring at a screen for a long time can also take its toll on your eyesight, especially if you don’t take the necessary precautions to protect yourself.

Thankfully, modern monitors come with various features designed to lessen the load on your eyes and reduce eye strain. These features include sensors that detect the amount of ambient light to auto-adjust the monitor’s brightness and various filters that aim to reduce the total amount of blue light that reaches your eyes.…

read more

Network In Review: Research & Planning; Whaling Attacks

You might have heard of phishing and even spear phishing, but what about whaling? Despite these names’ nautical themes, they all refer to various types of cyber attacks that aim to hook you as the hapless fish. Whaling attacks can be particularly dangerous.

You might have heard of phishing and even spear phishing, but what about whaling? Despite these names’ nautical themes, they all refer to various types of cyber attacks that aim to hook you as the hapless fish.

Whaling attacks can be particularly dangerous. But before we get into what this is all about, you’ll need some background on the other types of online attacks that make up the main parts of whaling.…

read more

TEK On The Street: ESET Launches Version 6

The latest release of the ESET Mobile Security suite comes with a safe space from where to launch finance apps. Banking trojans won’t get the chance to steal user data from the users, as the apps will run in a secured, isolated environment.

The sixth version of ESET’s ‘Mobile Security’ suite for Android devices has just landed, and it brings an exciting new feature called “Payment Protection.” As the name suggests, this system is meant to help Android users perform secure payments using their smartphones and to lock out any banking trojans and nasty malware strains that may be lurking undetected.…

read more

Network Week In Review: Guard Your Interior

this image shows fairfield network securityDon’t overlook this 1 HUGE issue by getting too comfortable. The weakness of any door is that legitimate people need to be able to get in and out. Often, we help people develop a highly secure and functional door to the Internet, but they give little thought to the physical door into their building.

Develop a strategy to verify that service personnel are legitimate with corporate issued IDs and track visitor movement through the office. Lock the server room door if it’s across the hall from an office that people frequent. Monitor the temperature and whether there is any water in the server room.…

read more