Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

0 Comments
Continue reading

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals--but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned supercomputer.

0 Comments
Continue reading

Hack a Hospital and Get Blacklisted By Other Hackers

Hack a Hospital and Get Blacklisted By Other Hackers

Hackers are notorious for committing cybercrimes and exploiting what seems like everybody and anybody. Yet, just as there exists honor among thieves, there’s an unwritten rule within the hacking community: leave hospitals alone.

0 Comments
Continue reading

For NATO, Cyberspace is Today’s Frontlines

For NATO, Cyberspace is Today’s Frontlines

It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and sea, cyberspace is now an operational domain, a place that can be considered a battlefield.

0 Comments
Continue reading

Drugs, Assassins For Hire, Weapon Sales, and More: All Conveniently Found On the Web

b2ap3_thumbnail_cybercrime_black_market_400.jpgThe Internet is a fascinating and wonderful place full of great, informative resources and websites, but it’s also home to online markets for illegal and unethical practices. These hotbeds of criminal activity are a danger not only to your business, but to everyone who uses the Internet.

0 Comments
Continue reading

Alert: New CryptoJoker Ransomware May Be the Worst Ransomware Yet

b2ap3_thumbnail_ransomware_hostage_400.jpgModern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, displaying a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall are somewhat manageable, a new variant called CryptoJoker makes it borderline impossible to recover your files.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hackers Hosted Solutions Malware Backup Microsoft Internet Software Network Security Innovation User Tips Mobile Devices Data Windows 10 Email Smartphones Efficiency Productivity Hardware Browser Business Workplace Tips VoIP Tech Term Disaster Recovery IT Services Productivity communications Business Continuity Smartphone Computer Business Management Data Backup Ransomware Android Miscellaneous Windows Cloud Computing Cybercrime Outsourced IT Office Automation Data Recovery Network Alert Server Chrome Managed IT Services Computers Router Save Money Managed IT Services Internet of Things Upgrade Telephone Systems Communication Quick Tips Windows 10 Artificial Intelligence Cybersecurity Facebook Social Media Collaboration Small Business Money Law Enforcement Health IT Support Virtualization App How To Mobile Device Gadgets Social Engineering Holiday Operating System Spam Applications Wi-Fi Office Tips Passwords Office 365 Password History Encryption Remote Computing Bandwidth Private Cloud Word Bring Your Own Device Gmail Mobile Device Management Work/Life Balance Two-factor Authentication Information Settings Google Drive BDR Mouse Managed Service Provider Keyboard Sports Data Management Data Breach VPN Networking HaaS Data Security Meetings Application Hacking Phishing Recovery Flexibility Scam Entertainment Microsoft Office Vulnerability Safety Paperless Office Voice over Internet Protocol Managed Service Marketing Data Protection Mobility Connectivity Apps Mobile Computing Telephone System Electronic Medical Records Redundancy Charger Wearable Technology Cleaning Legal Blockchain Robot Fraud Retail Black Market BYOD Battery Access Control Data Storage Save Time Avoiding Downtime Firewall Employer-Employee Relationship Social Comparison Budget YouTube IT Management Google Docs Government Hiring/Firing Augmented Reality Spam Blocking Human Resources Cryptocurrency Public Cloud Downtime IT Support Servers Patch Management eWaste Telephony USB The Internet of Things IT Plan Website Internet Exlporer Remote Monitoring Physical Security Saving Money Windows 7 Managed IT Data storage CES Business Intelligence End of Support Identity Theft Training Infrastructure DDoS Unsupported Software Best Practice Software as a Service Update Virtual Assistant PDF User Error OneNote Botnet Content Management Machine Learning Big Data Wireless Charging Wireless Internet Public Computer Shortcuts Cast Computer Care Relocation Digital Signature Emails MSP Information Technology Content Microchip Travel Reputation Password Management Benefits Leadership ISP Excel Workforce Advertising Virtual Reality Devices Camera Audit Tools Techology Business Mangement Books Current Events Chromecast Employee Trending Maintenance Mobile Office Cortana Wire Experience Vendor WiFi Humor Accountants Notifications File Sharing Sync Going Green Thought Leadership Audiobook SaaS Tech Support Search Engine Root Cause Analysis Customers HIPAA NIST Cryptomining Tip of the week Telecommuting Worker Commute Amazon Computer Fan Recycling Emergency Knowledge Digital Signage Files Education Authentication Worker Laptop Wireless Google Apps Smart Office Music Automobile Display Search Programming Biometrics Amazon Web Services Running Cable Shadow IT Bing Video Games Customer Relationship Management Smart Technology Database Windows Server 2008 Warranty FENG Value Criminal Network Congestion Streaming Media Google Search HBO Specifications Computing Infrastructure Remote Work Nanotechnology Rootkit Touchpad Workers Document Management IBM Security Cameras How to Practices Employer Employee Relationship Netflix Remote Worker Windows 10s Online Shopping Addiction Risk Management Assessment Help Desk Data loss Scalability Staff Customer Service Safe Mode Two Factor Authentication webinar Lithium-ion battery Business Technology Hybrid Cloud Environment Printer Social Networking HVAC IT Consultant Proactive IT Outlook Smart Tech Shortcut Skype Troubleshooting Supercomputer NarrowBand Hacker Apple Hosted Computing Computer Accessories Wiring Evernote Cache IT solutions Politics Television Screen Mirroring Instant Messaging Fax Server Conferencing Flash Vendor Management Uninterrupted Power Supply Administrator Monitor Enterprise Content Management Transportation Samsung Net Neutrality Frequently Asked Questions Millennials Internet exploMicrosoft Users Credit Cards Solid State Drive Start Menu Password Manager Distributed Denial of Service Wireless Technology Smartwatch Software Tips Multi-Factor Security iPhone Inventory Bluetooth People Unified Threat Management CrashOverride Thank You Company Culture Compliance Webinar Congratulations Printers Managing Stress Regulation IT solutions Twitter Biometric Security
QR-Code