Get rid of default settings!

Most wireless devices are being sold today with default configurations that are easily exploited. The three main areas to watch out for are the router administration passwords, SSID broadcasting, and the channel used to broadcast the signal. The default router passwords can easily be changed.

Continue reading Get rid of default settings!

IPhone lock screen bypass

Hacking personal pictures from iPhone Step 1: Since now you have target’s phone number, call on his/her iPhone – starting a FaceTime call will also do it.
Step 2: Now, targets iPhone screen will show a message icon, just click on ‘Message icon’ and then ‘Custom Message’ to go to the New Message screen where you are allowed to type a reply.
Step 3: Next, you need to activate Siri by long-pressing the Home button and say “Turn on Voice Over,” and Siri will get the job done by turning it ON. Continue reading IPhone lock screen bypass

Something to think about before jumping to the cloud

Cloud Security The CIA is using a private cloud and not the public cloud. Stating that it’s because of security risks. Doesn’t your company face the same security risks of shared resources and target of hackers.

The public cloud is stable and reliable but it can still fail and has.

Having a private cloud your data doesn’t have to travel half way across the country or the world. Saving your company time every time you need to retrieve information.

With the public cloud you never know how old the technology is or if they are keeping it up to date. With a private cloud you control it, not some stranger you have never meet. Continue reading Something to think about before jumping to the cloud