Category: Security

We’re big fans of all types of technology here at TEKHELPER – not just the electronic and computer variety and have a great fascination for all things automotive and aeronautical. We think the Acura RLX with its tri-motor hybrid powertrain is a triumphant piece of engineering that does not get the credit it deserves.

After all it’s is broadly similar to what McLaren Automotive has implemented in the mighty P1 and Porsche in their 918 Spyder and actually came to market earlier in a car that does not have a seven figure price tag.

However a recent news report from Reuters, has us quite amused and as well as shaking our heads.

http://reut.rs/ZkSio9

Car to car communication sure will have benefits like collision avoidance and allowing greater vehicle density while ensuring traffic moves smoothly on highways. Not to mention the ability to eat your bagel with both hands, have a shave or apply makeup on your morning drive to the office.

But anyone who’s old enough to remember the, “tractor beam” from Star Trek can imagine a scenario where law enforcement takes over the brain / ECU of a criminal’s car, locks the doors to prevent escape and then wirelessly tows the car right to the police station.

No more high speed chases and helicopter overhead capturing the riveting drama when the car obediently follows the Troopers car!

Hackers will quite likely find ways to possibly have your car do things you do not want it to do, in spite of assurances from manufacturers that no such thing will happen.

However our clients can count on their trusted technology partner, TEKHELPER to help them hacker-proof their cars by shielding their ECUs among other things.

(Image used is from Acura.com - no copyright infringement intended)
Read the rest

One of the most overlooked actions when it comes to IT security is opening attachments or clicking links in email.

More often than not in spite of the best antivirus protection and spam filtering an odd email with a phishing link slips through multiple layers of defense and all that stands between a clean PC and a compromised one is YOU the user.

If your’e not sure just give the sender a ring to check if the email is legitimate and spare yourself the trouble of an infected PC… Read the rest

Security Breach – Wired Magazine reporter hacked.

I though that this is a must read for all of us who so heavily rely on the convenience and enjoyment that technology brings.

This is not a story by a reporter on IT security…this is a first person story of how the reporter himself was hacked!

Matt Honan writes for the tech Magazine WIRED and is also associated with the Gadget Blog GIZMODO. It can happen to you and it’s a real eye-opener.

It may seem a bit long, so sit down and pour yourself a favorite beverage, but read it completely to understand how supposedly foolproof security, checks and balances can be circumvented by a little social engineering.

The biggest takeaway from this is that with so much of our personal lives being digital, it would be unwise not to backup one’s data….regularly.

http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/

Stay safe and backup your data!Read the rest

Tagged with: , ,