Midsize Insider

All

Gabriel Knight

Gabriel Knight

Writer
Connect with Gabrielk on Twitter Connect with Gabrielk on Facebook Gabrielk's website
Gabriel has over 17 years of experience working in the quality assurance, IT and engineering fields. His work has placed him at IBM, Microsoft, Boeing, and several other companies. The past three years he has worked as a freelance writer; writing content in Australia, the U.K., Spain and the U.S.

https://plus.google.com/107536885005202861285?rel=author

Articles by Gabriel Knight

Start-ups to Make Email The New Executive Assistant

A slew of start-ups have decided to bring new technology to an old friend, email. The basics behind email services have not changed in 40 years, and a few companies have decided it is time for a change. Email seems ...

HP Follows IBM with New SDN Strategy

Last week, HP introduced its strategy for software defined networking (SDN). This emerging architecture separates the control plane from the data plane in network routers and switches. HP announced that all of its campus switches now support OpenFlow, an open ...

Chinese Use Spear Phishing Attack to Infiltrate White House

A White House employee was the target of a spear phishing attack assumed to have originated from China. Although, it sounds like this was a major occurrence in the White House, it is not. These types of scams happen on ...

FBI Issues Fraud Alert to Financial Institutions

Wells Fargo, U.S. Bancorp, and several other financial institutions have been issued a fraud alert by the FBI, Financial Services Information Sharing and Analysis Center (FS-ISAC), and the Internet Crime Complaint Center (IC3).Several of the distributed denial-of-service (DDoS) attacks have ...

New Java Zero-Day Vulnerability Places 1 Billion PCs and Macs at Risk

A new zero-day vulnerability exploit has been found in all current supported versions of Oracle's Java platform. This exploit affects more than 1 billion PCs and Macs running Oracle's software.This is just the latest in a tidal wave of issues ...

Hacktivists Attack Wells Fargo, Say U.S. Bancorp is Next

Hacktivists, calling themselves "Mrt. Izz ad-Din alQasssam Cyber Fighters," attacked Wells Fargo and posted on Pastebin that U.S. Bancorp and PNC Financial Services Group are next.The attacks are in retaliation for the anti-Islamic film "Innocence of Muslims." Earlier in the ...

Arab Electronic Army Hacktivists Attack Western World Because of Film

Arabian hacktivists have attacked nine websites in response to the anti-Islamic film "Innocence of Muslims." An email sent to Al Arabiya News Channel says that the army of four hackers--calling themselves the Arab Electronic Army--are from Syria, Morocco, and Saudi ...

Mobile Cyber Attacks: Government says 3 Out of 10 Phones Infected

Cyber attacks against the mobile device industry have more than doubled in the past year. Everyone knows that it can be unsafe to click on a specific, unknown link or to visit an unknown site. But many do not know ...

Shamoon Virus-Did Iran Attack Saudi Aramco?

On August 15, Saudi Aramco was attacked by the Shamoon virus, a new virus that deletes the hard drive once it has finished stealing files. A never-before-heard-from group, calling themselves the "Cutting Sword of Justice," claimed it was a political ...

Malware Prevention Is the Best Medicine

Malware is becoming increasingly more uproot with every coming month. Governments are now using cyber warfare against their enemies and allowing their technology to leak across the continents. Hackers are making money, not only by breaking into secure systems, but ...

Stuxnet Virus Created by US and Israel to Stop Iran's Nuclear Program

There has been speculation that the Stuxnet virus was created by the United States or Israel. After an 18-month investigation and several interviews with American, European, and Israeli officials, it seems that the rumors were true. The virus was created ...

Flame Virus Disguised as Microsoft Certificates Invades Windows-Based Machines

The Flame virus is all over the tech news in recent weeks due to its attack on Iran's nuclear and oil export facilities and its accidental release into the public. After the virus was found and its information hit the ...

Botnets: White House Holds Summit to Fight Back

Botnets, a collection of compromised computers, are the leading Internet security threats in the world. Over 5 million computers were affected between the months of January and March of this year. The White House held a summit last week consisting ...

Flame Virus Possibly Brain Child of the NSA

Flame and sKyWlper are names given to the data-retrieving virus found on several Iranian servers. A recent wipe of data on Iran's energy industry computer networks flushed out the 20 MB of code that should not be there. Security experts ...

Hactivism Seen as This Year's Greatest Threat

Hactivism was the leading cause of compromised data in 2011, said Verizon in a recent study. Cyber criminals caused a greater number of breaches, but hactivists stole much more data. The investigation also showed that several of the breaches performed ...

Facebook and Google Privacy Policies More Confusing Than Government Documents

Facebook and Google have come under fire for using too much legal speak in their privacy policies. A survey performed by global strategy firm Siegel+Gale shows that most users do not understand Google's privacy agreement, despite Google's recent update for ...

The Cloud's Effect on IT Costs--Is Your Job at Risk?

It's no secret that IT costs and expenses are going through the roof. As cloud computing continues to grow, so will the initial costs of labor, products, and services. Businesses know the high expenditure now will pay off years down ...

Facebook and Senators Say Requiring Passwords Could Be Illegal

There is a new trend in the job market: Employers are requiring job candidates to give them their Facebook passwords as part of the interview process. It is not uncommon for employers and schools to review online profiles to verify ...

Google's New Privacy Rules--Hacker's Dream and IT Nightmare?

Google has recently decided to combine its more than 60 user agreements into a single user agreement. They have also decided to link and store all information gained from users who access their services into a single database. In other ...

Researchers Find Security Flaws Signing in to Facebook, Google, and Others

Many leading web technology companies rely upon a standard Single Sign-On (SSO) web service for authenticating user's login information. A study performed by Rui Wang and XiaoFeng Wang from Indiana University and Shuo Chen from Microsoft found several security flaws ...

« Previous12Next »