Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

0 Comments
Continue reading

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals--but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned supercomputer.

0 Comments
Continue reading

Hack a Hospital and Get Blacklisted By Other Hackers

Hack a Hospital and Get Blacklisted By Other Hackers

Hackers are notorious for committing cybercrimes and exploiting what seems like everybody and anybody. Yet, just as there exists honor among thieves, there’s an unwritten rule within the hacking community: leave hospitals alone.

0 Comments
Continue reading

For NATO, Cyberspace is Today’s Frontlines

For NATO, Cyberspace is Today’s Frontlines

It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and sea, cyberspace is now an operational domain, a place that can be considered a battlefield.

0 Comments
Continue reading

Drugs, Assassins For Hire, Weapon Sales, and More: All Conveniently Found On the Web

b2ap3_thumbnail_cybercrime_black_market_400.jpgThe Internet is a fascinating and wonderful place full of great, informative resources and websites, but it’s also home to online markets for illegal and unethical practices. These hotbeds of criminal activity are a danger not only to your business, but to everyone who uses the Internet.

0 Comments
Continue reading

Alert: New CryptoJoker Ransomware May Be the Worst Ransomware Yet

b2ap3_thumbnail_ransomware_hostage_400.jpgModern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, displaying a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall are somewhat manageable, a new variant called CryptoJoker makes it borderline impossible to recover your files.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Malware Hosted Solutions Backup Network Security Microsoft Internet Windows 10 Innovation User Tips Mobile Devices Software Data Smartphones Business Email Browser Hardware Tech Term Efficiency VoIP Productivity Computer Business Continuity Disaster Recovery Smartphone Workplace Tips Data Backup Ransomware Miscellaneous IT Services communications Android Productivity Cybercrime Business Management Windows Cloud Computing Data Recovery Network Alert Office Chrome Automation Outsourced IT Computers Router Managed IT Services Server Internet of Things Communication Telephone Systems Artificial Intelligence Save Money Managed IT Services Upgrade Cybersecurity Small Business Quick Tips Facebook Collaboration Money Law Enforcement Windows 10 Social Media Virtualization How To Spam Social Engineering Holiday Health Applications IT Support Wi-Fi Office Tips Office 365 Passwords Password App Bandwidth Mobile Device Two-factor Authentication Gadgets Word Bring Your Own Device Gmail Operating System Work/Life Balance Mobile Device Management Information Settings History Remote Computing Google Drive BDR Application Data Management Recovery VPN Data Breach Private Cloud HaaS Data Security Hacking Phishing Microsoft Office Mouse Managed Service Provider Entertainment Flexibility Scam Managed Service Vulnerability Safety Voice over Internet Protocol Marketing Data Protection Connectivity Mobility Networking Apps Sports Keyboard Encryption Access Control Black Market BYOD Battery Data Storage Avoiding Downtime Firewall Employer-Employee Relationship Saving Money Comparison Meetings Hiring/Firing Spam Blocking YouTube IT Management Google Docs Government Public Cloud Human Resources eWaste Downtime IT Support Servers Patch Management Telephony The Internet of Things USB IT Plan Website Windows 7 Internet Exlporer Remote Monitoring Physical Security Business Intelligence End of Support Identity Theft Training Managed IT Data storage CES Mobile Computing Retail DDoS Infrastructure Paperless Office Robot Unsupported Software Best Practice PDF Software as a Service Update Virtual Assistant User Error OneNote Botnet Content Management Machine Learning Big Data Redundancy Social Telephone System Electronic Medical Records Wearable Technology Cleaning Fraud Charger Budget Legal Blockchain Camera Audit Tools Techology Chromecast Business Mangement Books Current Events Customer Relationship Management Trending Mobile Office Save Time File Sharing Sync Going Green Cortana Wire Experience Vendor WiFi Humor Notifications Accountants Tip of the week Telecommuting Tech Support Worker Commute Amazon Thought Leadership Audiobook SaaS Search Engine Root Cause Analysis Customers HIPAA NIST Education Authentication Worker Computer Fan Recycling Emergency Knowledge Customer Service Files Shortcut Augmented Reality Laptop Wireless Google Apps Smart Office Music Automobile Social Networking Display Search Windows Server 2008 Running Cable Shadow IT Amazon Web Services Bing Video Games Cryptocurrency Smart Technology Computing Infrastructure Remote Work Nanotechnology Rootkit IT solutions Warranty FENG Value Streaming Media Criminal Network Congestion Fax Server HBO Specifications Practices Employer Employee Relationship Netflix Remote Worker Windows 10s Touchpad Workers Document Management IBM Security Cameras How to Hybrid Cloud Online Shopping Addiction Risk Management Assessment Help Desk Data loss Lithium-ion battery Scalability Staff Safe Mode Two Factor Authentication webinar Environment Smart Tech Printer HVAC IT Consultant Outlook Hosted Computing Computer Accessories Wiring Skype NarrowBand Troubleshooting Supercomputer Hacker Apple Maintenance Flash Evernote Cache Politics Television Screen Mirroring Instant Messaging Conferencing Frequently Asked Questions Millennials Internet exploMicrosoft Uninterrupted Power Supply Users Credit Cards Vendor Management Administrator Monitor Enterprise Content Management Transportation Samsung Inventory Bluetooth Unified Threat Management Solid State Drive Start Menu Distributed Denial of Service Wireless Technology Password Manager Smartwatch Software Tips Multi-Factor Security People iPhone Emails MSP Information Technology Wireless Charging Wireless Internet Public Computer Shortcuts Cast Computer Care Relocation Digital Signature Excel Workforce Advertising Virtual Reality Devices Content Microchip Travel Reputation Password Management Benefits Leadership Programming Biometrics Company Culture Webinar Compliance Printers Managing Stress Regulation IT solutions Twitter Thank You Congratulations CrashOverride
QR-Code