5 Steps to Secure Data from Ransomware Attack

Business segments becoming increasingly attractive target for developers cipher-malware. According to Kaspersky Lab’s report, based on data from Kaspersky Security Network (KSN), the number of attacks on the corporate sector in the period 2015-2016, compared with 2014-2015 grew six-fold (from 27,000 to 158,000).

This fact shows that the ransomware try to encrypt the data of each one in ten users B2B.

Cyber criminals who use ransomware attack often start businesses, especially small and medium enterprises (SMEs).

This trend is confirmed by IT Security Risks 2016 report from Kaspersky Lab and B2B International, where 42% of respondents from small and medium enterprises (SMEs) agreed that crypto-malware is one of the most serious threats they face last year.

For small companies, even though in the short period can lead to significant losses or even bringing all their operations stopped completely.

If a company has not taken appropriate steps to ensure the security of important data, then buy the decryption key from cyber criminals is the only way to recover the data.

However, this does not guarantee complete data recovery. The best way to protect enterprises from malware is to prevent attacks early on.

Kaspersky Lab experts recommend to companies of small and medium enterprises (SMEs) to follow the 5 steps following these simple safety rules.

1. Make a backup copy of all important files on a regular basis. Companies must have two backups. One in the cloud (eg Dropbox, Google Drive, etc.), and another in an additional server or on a removable medium if the data volume is not too large.

2. Use well-known and trusted service providers who invest for security. Usually you can find the security recommendations on the company’s website. They also published an audit of the security in the cloud infrastructure from third parties.

Do not assume that the cloud provider has absolutely no security issues, availability or data leakage. This raises the question, what would you do if you delete the data security provider.

There should be a data backup and restore process transparent data in conjunction with data protection and access control.

3. Avoid the use of security services and anti-malware software for free. Usually small businesses expect basic security features in free solution offered is sufficient.

Free security solution does provide basic protection, but often they fail to provide layered security support.

Instead, look at a special solution, which does not require a large investment, but is able to provide a higher level of protection.

4. Regularly update the OS, browser, anti-virus, and other applications. Cyber criminals use the vulnerabilities in the most popular software to infect users of the device.

5. Prevent the precarious situation of the TI – invite experts to configure enterprise security solutions. Small businesses typically do not have an IT department or a dedicated full-time administrator.

Companies rely only on employees who best understand IT issues to deal with computer problems, in addition to regular duty.

Do not wait until an incident occurs, use of IT support IT service providers to review the software and security configuration from the outset.

“Crypto-malware threat that is increasingly serious, not only the company suffered a loss of money for the ransom, but the business could be paralyzed during the recovery process file. Vector of attack is quite extensive including website, email, exploitation software, USB devices, and others,” said Konstantin Voronkov, Head of Product Management Endpoint Kaspersky Lab via email.

To avoid infection, he added, IT personnel must explain where the attack originated and these employees should not open email attachments, visit the web from untrusted sources or connect a USB device to a computer that does not have protection.

Voronkov said anti-malware solutions become important measure to avoid security incidents occur frequently.

If there are files of companies that are ciphered, it does no harm and is worth a try. If at all possible, to restore the file using the free facilities or key decryptor

6 Tips on buying a secondhand laptop cheap and quality

Laptops can be practically almost replace the function of the computer in daily activities at this time. Indeed, computers are still pretty much used to work in an office or activity in the gaming house and cafe, but the laptops offer high mobility dangerously close to the specifications of the computer.

The higher the specification of a laptop, the more expensive price. Therefore, one of the most economical way to have a high specification laptop is to buy a used laptop. Well, so you can get used laptops cheap but still good quality, follow some of these tips.

1. Buy from a trusted friend

Before getting into the online trading forum, you can start from their own friends first. Perhaps among them there are indeed willing to sell the laptops at low prices and quality is still good. If your friend slick, chances are you get a laptop that is still okay bigger.

2. Use the COD system

The payment system in place, or better known by COD (Cash On Delivery) is the best way to trade second-hand goods. You have to meet directly with the seller to determine the characteristics of the seller (slick or not) while trying to direct the performance of the laptop.

3. Check the market price range

If you know the market price of a new laptop, you can make it as a base to negotiate with the seller. Then, you can also check the prices of many used laptops sold in an online trading forum thrift. In this way, you can get to square off what a fair price for a used laptop that you shoot.

4. Search for a laptop with a life under 1 year

The longer the lifetime, the cost is the price of the laptop. However, laptop-of-life for too long certain potentially been damaged in certain parts.

In addition, the lifetime under 1 year is usually still covered by the warranty. This makes the laptop is still quite secure in terms of quality.

5. Check if the specification laptop

While fiddling with a used laptop, make sure you check if the specifications mentioned in accordance with the seller. You can see this in the Settings section, or open a command run (press Start + R on the keyboard), type ‘dxdiag’ and press enter.

6. Check the condition of the hardware

The final step, make sure the hardware conditions are still in good condition or in accordance with the seller described. For example, to check all the hard drive, you can copy and paste a number of files in the folder or drive. If it is very slow, it is likely a problem hard drive.

Check also the whole key keyboard and mousepad is still functioning well, because if there is damage, it will be difficult to be replaced. Also make sure the display, WiFi, USB port, fan, webcam, etc., are still functioning properly.

A week released, Pokemon Go downloaded 10 million users in Android

New week released in several countries, gaming (games) Pokemon Go has been very popular. After Pokemon Go out of its beta status, is now reported to have games downloaded by 10 million users of Android based on data from Google Play.

This figure is growing as the global launch of Pokemon Go in various other countries in the world.

However, this figure is not meant games Pokemon Go is played actively by 10 million people through its Android devices. That number represents the total number of applications downloaded and published by Google.

While those who install Pokemon Go raw format of the application Android application package (apk) and play it actively not included in the count above.

Up to now, there is uncertainty about how the number of active players. That is, only the developer that could answer that question.

If you notice, of course, 10 million downloads within seven days of the launch, a figure which is quite fantastic.

Some Benefits and Reasons Why You Should Choose Die Casting Method

When creating parts, there are many methods that can be utilized for the process. However,not all of these processes are created equal. Aluminium alloy die casting is the preferable method when it comes to parts casting. Here are some benefits and reasons why you should choose this method over others.

1. Die casting is an excellent method when combined with high-speed production. Thousands of castings can be made before any kind of retooling is required. The shapes created are able to be far more complex than those created with other production methods.

2. Die cast parts, especially those made from aluminum alloys, are resistant to heat and are known to be far more durable.

3. The strength of casts made from alloys is far greater than that of those made from plastic injection molds. In addition, since castings are all one piece and not fastened together, the strength is in the actual alloy and not in the joining process.

4. The surface finish on the product can be manipulated to the liking of the customer, no matter whether if it is textured or a smooth finish. Holes or threads or both can be manufactured in to the cast itself with no problem.

While there are several other types of manufacturing processes, aluminum alloy die casting remains superior in virtually all aspects. Here is a brief summary of how casting matches up with other processes:

Versus Billet Machined Parts- Producing parts from billets creates a considerable amount of scrap and is really only useful for a small amount of parts. Casting remains far more economical.

Versus Stamping- Casting can result in more varied shapes than stamping could ever hope to achieve. Choices in thickness are also increased when casting is chosen.

Versus Forgings- Castings can be made in a wider variety of shapes over traditional forging methods. Also, the fortifications can be made thinner with castings.

An experienced casting company such as Autocast can manufacture virtually anything that you can imagine using either aluminum or zinc alloys. When choosing to go with the casting method, make sure that the company is aware of the exact specifications of your project in advance.

Latest generation Bluetooth Promises High Transfer Speed

The latest version of the most popular wireless networking, Bluetooth, ready to slide on 16 June. Certainty is expressed directly by the Executive Director, Bluetooth, Mark Powell, some time ago.

This update will be named Bluetooth 5, no frills point behind the figures for updates. The move was chosen to simplify and facilitate the marketing process name.

Bluetooth 5 confirmed attendees with a series of new capabilities that make it better, especially in terms of speed.

This latest version has a wider range and speed transfer superior Bluetooth 4.2 up to four times.

In addition, there is also the addition of a much larger capacity when transmitting. Thus, information from a device that is not connected is much faster making it easier for the user.

It is uncertain how the amount will be used in packet transmission for Bluetooth 5.0. However, it will be more than the ability of the current package, ie, 47 bytes are 31 of them are available for data.

Unfortunately, unconfirmed list of devices that will be compatible with this latest version of Bluetooth. However, generally the latest version of Bluetooth requires a new Bluetooth device as well, not just through software updates.

For that, most likely Bluetooth adoption of the new 5 will be present at next year on devices, such as laptops, tablets, mobile phones, including other wireless accessories.

5 Do not install this popular app on your Android

Currently, the application becomes inseparable from smartphone users. How could I not, with a variety of applications, the user is possible to do various activities such as playing games or writing reports.

On the other hand, a variety of functions and the advantages it was not shared by all applications on the Google Play Store. Android users must recognize that not all applications are really helpful and have features capable.

In fact, not a few of the popular apps appeared to save malicious files or even threaten the security of the user.

To that end, muster popular applications that actually do not need to be installed on Android phones, as quoted from page Make Us Of.

1. ES File Explorer

For Android users, ES File Explorer is an application explorer app is popular in a few years. In addition to presenting a variety of features, this app also has a display that allows users to explore the data available Android on their devices.

However, this does not occur if the user is wearing the free version of the application. Various bloatware and ad-ware appear at any moment. Not only that, a notification pop-up contains an invitation to download additional applications often appear suddenly and can not be disabled.

Alternatively, users can use the application OI File Manager is already available Google Play Store. In addition, there are also applications FX File Exproler and Total Commender.

2. UC Browser

Browser Chinese origin is called so popular in China and India. This application claims to have ‘fast fashion’ that is able to load websites faster. The mode is also capable of compressing the site so that less data consumption.

Nevertheless, this browser has security related problems of tracking. That is because the search list sent without encryption to India Yahoo and Google. That list includes IMSI number, IMEI number, Android ID, including Wi-Fi Mac address.

For users concerned with the security, Google Chrome and Mozilla Firefox can be an option. However, keep in mind that not all browsers have adequate security features.

Besides UC Browser, Dolphin Web browser also has a similar problem. Mobile browser was found to have a security hole that makes the data is sent without encryption.

3. CLEAN it

As the name implies, this application has a function to clean up junk files on your smartphone. Because of the popularity, the application is already installed on more than 10 million times and have a high rating.

Nevertheless, basically the application is not very useful because it clears the cache memory does not affect the speed performance of the smartphone. In addition, cleaning RAM only result in the use of a larger battery.

Even so, for those of you who still want to use applications with similar capabilities Greenify can choose to save battery power. SD Maid There are also applications that can be used to clean up garbage data.

Other applications that also have similar features is a Clean Master. Application made by Cheetah Mobile also does not have many uses and are often your ads appear.

4. DU Battery Saver & Fast Charge

This application has a function similar to CLEAN it. Only, this app has additional features to speed up battery charging. There are more than 7.6 million users who have downloaded this app.

Although it looks capable of accelerating battery charging, this app actually does not have that capability. Not to mention so many of these applications show ads that might be annoying for most users.

Alternatively, people can use applications such as GSM Battery Monitor to monitor the battery status of the device. Meanwhile, in order to save power the user can select the features available in the application Greenify.

5. Application of Anti-Virus

At present, many anti-virus application that can be found in the Google Play Store. In fact, many of whom are developers who also have anti-virus software for the PC. However, how effective anti-virus for Android devices?

While not bad, it does not mean an Android device really need anti-virus applications. One reason is still the number of security holes that sometimes opened by the user, such as to root the device or install unofficial applications.

Both conditions were certainly open up a security hole bigger. However, that does not mean anti-virus applications have no usefulness at all.

Some applications such as Avast and Avira offers extra data safety features, such as locking the screen until the call blocking.

3 Causes your iPhone charger cable is easily damaged

Although priced at exorbitant prices, there must be a problem that occurred on the iPhone. The most commonly experienced issues certainly easy iPhone charger cable is damaged, whether it could not be used for charging, or cord torn.

The most annoying, when you replace a new cable, the same thing will happen again a few months later. So, is this one user, or any Apple?

There are a number of reasons why the iPhone charger cable is easily damaged. All will certainly be back again on how you take care of the charger cable and keeping well. Without elaborate further, consider the following causes.

1. Material Rubber Perishable

Cables for gadgets like tablets and smartphones are usually coated material PVC (polyvinyl chloride) plastic. This material is used as an insulator for electrical cables that make it a solid, durable and elastic.

In fact, Apple does not use PVC in all its products. The reason is simple, the material claimed to be environmentally friendly and contains no harmful chemicals, which are substances plasticizer to make PVC so elastic.

Instead, Apple uses a rubber material which makes the charger cable is so thin, lightweight, and easily rolled. Well, the rubber too, has drawbacks. This material is easily peeled off, even if exposed nails though.

Because it is so flexible, if users scroll cable is too tight, the layer at the near end of the cable will be strained. When this is often done repeatedly, the layer will be broken and torn.

2. Cable is Not Treated

Often the charger cable is only used for charging the battery, so that users forget to take care of and using a wired correctly. It can be seen from how to roll and plug or unplug the USB slot.

You can also protect the ends of the cord to break with the clip on ferrite ring or some sort of small ring that protects the ends of the cable.

3. Strain Relief

This is the reason why the iPhone charger cable is more easily damaged than Android charger cable.

IPhone charger cable does not have a “ring” with a neck cord segments on the so-called Strain Relief. This is supposed to protect the neck from bending wires that could break the internal parts of the cable.

Apple itself even bring Strain Relief bermaterial rubber easily broken, Even “bad” views, it is still not able to make more durable iPhone charger cable.