-- particles

Homographs: Using Different Languages to Steal Your Data

Many hackers rely on their ability to trick users into giving up information or control of their technology. As technology advances, hackers continue to find new and updated ways to gain access to user accounts. One scam in particular, known as homographs, has seen an increase of popularity as of late. What are they? Homographs are a phishing strategy that is used to disguise a hyperlink to look like a legitimate, secure website. Scammers are able to use these attacks due to the way that many browsers interpret URLs with characters from another language. An example of this can be found with Russian Cyrillic letters, many of which look similar to English letters. To account for this, browsers utilize basic translation tools so a user can still access a legitimate website using non-English characters by translating the address into a series of English letters and numbers. How do hackers use homographs? Hackers are able to take advantage of homographs by using letters from another language that look identical to letters of the English language. They create a URL that looks identical to the legitimate site, but once clicked it will automatically take you to a compromised site where your data can be at risk. This attack works because users won?t be able to see that the URL is not legitimate until it is too late, as once they click the link they will most likely be infected by malware. How can I protect myself? While many browsers have created fail-safes to combat this issue, there are still many browsers that are left unprotected. Even those that do use the fail-safes can be easily tricked, so it?s up to the user to prevent the attack. Be conscious of every link you click, and never open up a URL that you cannot verify. This means any URL in an unknown email address, or a pop-up ad that claims to be a legitimate company. The best way to avoid homograph attacks is to always manually type in the web address. Want to know more about how to prevent cyberattacks? Contact Info Advantage at (585) 857-2644 to talk to our security and technology professionals today.

How Rugged Are You? A Guide to Rugged Laptops

Face it, your laptop isn?t indestructible. There are only so many times you can throw your laptop in a cramped bag or have it drop from your hands before you see some damage. While many laptops can be saved with something as simple as a sturdy case, many modern professionals work in conditions that make it very difficult to protect the technological equipment needed for businesses to run smoothly. That is why many manufacturers are creating lines of ?rugged laptops,? which can withstand even the harshest of work conditions. What Are Rugged Laptops? A ?rugged?? laptop is a PC that has been designed to withstand very harsh environments and conditions, such as heavy traveling or factory work. These laptops are built to withstand just about anything, including drops, spills, extreme temperatures, and much more. There are a variety of different types of rugged laptops, each built for a specific purpose. Many rugged laptop vendors offer an assortment of rugged laptops that are classified into three ?levels? of ruggedness; semi-rugged, fully-rugged, and ultra-rugged. Semi-rugged laptops are typically enhanced versions of commercialized laptops with more protection, where an ultra-rugged laptop is built from the inside-out to resist even the harshest environments. What Classifies a Laptop as Rugged? Most rugged PC manufacturers use the MIL-STD-810 environmental durability standards to test how rugged their laptops are. The MIL-STD-810 was originally created in the 1960s by the US Department of Defense as a guideline for designing military-grade technology that can be used in high combat areas. The standard provides a variety of different test methods which can be used to ensure equipment is suitable enough to be used on the field of combat. This includes tests for temperature, vibration, impact, water resistance, altitude, sand or dust, and more. Manufacturers are also known to reference the Ingress Protection Code, which classifies the degrees of sealing protection of electrical equipment, and the NEMA classification, which describes different electrical enclosures and how they hold up in different environments. Who Should Be Using Rugged Laptops? While rugged laptops are typically designed for people who work in extreme conditions, just about any business professional can find value in a rugged laptop. While you may not be using your laptop underground or at sea, your personal computer may be taking on more damage than you think. Laptops are often shoved in bags or airplane compartments, or left in places they could potentially get damage, such as a bathroom or kitchen. Therefore, just about anyone who takes their business on-the-go can find benefits from ruggedized laptops.   If you?re interested in a more rugged laptop but don?t know what level of protection you need? Contact the technology experts at Info Advantage today at (585) 254-8710 to talk about what technology solutions will best fit your business. [Photo: DoD]

The Dangers of Autofill: How Scammers Can Use Browsers to Steal Credit Cards

If you?re an avid online shopper, you know the struggle of having to fill out your information each and every time you want to make a purchase. For many, autofill is a way to save time when shopping online. While this feature is convenient, it can also put your data directly into the hands of cybercriminals if a user isn?t careful. How They Do It Hackers are able to use autofill to their advantage by adding hidden fields in a sign-up form. These fake sign-up forms try to trick users into giving up more information than they think they are. The form may seem to only ask for a name or email address, but can secretly also take any other information that has been saved in a browser?s autofill. This could include information such as a billing address, phone number, credit card number, security codes, and other sensitive personal data. While this method of attack isn?t necessarily new, whitehat hackers have had trouble finding effective ways to counter the threat. Prevent an Autofill Attack Autofill attacks can happen to nearly any user on any browser that has autofill enabled. However, browsers such as Chrome and Safari are particularly prone to these types of attacks, as autofill comes pre-configured when the browser is first downloaded. To avoid these types of attacks, experts suggest using a browser without autofill, such as Firefox. If you want to stick with Chrome or Safari, you may want to consider disabling the autofill feature. If you enjoy the convenience of autofill, make sure you only utilize the feature on sites that have been marked as secure. Otherwise, it?s advised that you take the time to fill in each field by hand to avoid giving information you don?t want to give. Worried that your sensitive data might be at risk of leaking? Call Info Advantage at (585) 254-8710 today to talk to a security expert about how you can keep your private data safe.

Business Continuity and the Cloud

In the face of disaster, a solid business continuity plan can be the difference between seamless back up and hours of downtime. Traditional back up plans often required in-house equipment to keep their systems running, which were often costly to maintain and unreliable. Fortunately, new technologies have paved the way for the future of business: the cloud. By hosting their back up data in the cloud, companies can spend less time worrying about their back-up plan and more time doing what they do best; business. Increased Uptime In the case of in-house backup, the entire fate of a business can rely on physical hard drives that store their critical data. If those hard drives are lost, broken, or stolen it could mean serious downtime. Having your business in the cloud makes this an issue of the past. With cloud backup, your critical data is accessible from virtually anywhere, making it easy to access during a disaster and eliminating downtime and loss. Higher Frequency of Back Up Disasters can happen any time, and they won?t wait for your data back up to kick in. For many businesses, real-time backup is needed in order to prevent the loss of major data, as most companies are working on files and updating information throughout the day. By hosting your data in the cloud, you will be able to ensure that the important work that is being done during business hours isn?t lost. Many providers offer hourly, daily, and monthly backup plans, and some will even allow you to set your own backup schedule. Faster Response It can be difficult for a business to keep constant check on the status of the backup data, and often neglect to take care of any issues that can leave their data vulnerable. With cloud backup, the monitoring can be left to the providers. This means a faster response time when something goes wrong, creating a seamless backup environment for your business. In addition, cloud providers have access to all the latest technologies, allowing them to constantly provide their clients with newer, more efficient services. Want to learn more about how your business fits into the cloud? Contact Info Advantage today at (585) 254-8710 to speak to an IT professional about how the cloud can work for you.