News & Events

June 24th, 2014

EMC Corp., a leading provider of IT storage hardware solutions, developed a new index which showed that people behave as though privacy doesn’t matter to them despite them acknowledging it’s a top priority. This study, which included 15,000 consumers in 15 countries, revealed that while privacy is a concern, few are desired to do anything about it. According to EMC, this study revealed three paradoxes: while 91% of consumers say they want all of the conveniences and benefits of digital technology, only 27% were willing to trade privacy in return; Consumers usually don’t take any action to protect their privacy, as 62% of respondents said they didn’t change their passwords regularly and 30% said they don’t use password-protection on mobile devices; consumers freely share personal data on social media platforms, even though only 51% of respondents are confident that these services can protect their data and only 39% have confidence in the ethics of those organizations.

Interestingly, these attitudes varied from country to country. Germany, for example, was the most concerned about privacy and taking steps to protect it, whereas India was the least concerned. There were few differences based on gender, but women in the US were more inclined to protect their privacy, though the US as a whole fell in the middle of the aforementioned global spectrum.

With such laidback attitudes, it’s up to companies to take action to safeguard consumer privacy.

Read Full Article

June 20th, 2014

Last month the FCC announced its plans for net neutrality, and today the Democrats in the House and Senate have introduced a bill that would require the FCC to ensure that ISPs don’t speed up some content at the “expense of others.” This proposal, introduced in the Senate by Sen. Patrick Leahy and in the House by Congresswoman Doris Matsui, would ban the prioritization of websites like Netflix, for example, to run faster than an email hosting or less popular website. Although the Online Competition and Consumer Choice Act would help protect against the tiered Internet that the FCC is proposing, it would only apply to the connections between consumers and their individual ISPs.

Read Full Article

June 11th, 2014

On Tuesday, Microsoft released a new patch for IE that brings with it seven new security bulletins – two of which are critical. These bulletins address 66 vulnerabilities; 59 of them, a record number for a single bulletin, are related to The Cumulative Security Update. Microsoft addressed flaws present in remote desktop, Lync Server, XML Core Services, Word, TCP Protocol, and an integral graphics component.

Read the full article at PC World to learn more about the Microsoft update and ways in which to avoid specific malware targeting these vulnerabilities.

Read Full Article

June 10th, 2014

CIOs and IT executives are now able to take a leadership role in how their company modernizes itself by driving the implementation of new tools and procedures. Additionally, IT departments can become more involved in what their company sells, as they no longer need to spend their time automating back office functions. Instead, they can treat their company as a collection of services.

Click below to find out how companies can reinvent themselves by operating like a network:

Read Full Article

June 2nd, 2014

The New York Times reports that government agents took control of two computer networks that are used by hackers to steal banking information and lock files on infected computers. This feat effectively disrupts the world’s most malicious viruses, GameOver Zeus (which steals bank information and sends it to hackers located overseas) and CrytpoLocker (ransomware in which hackers encrypt personal data and then demand a ransom to unlock the files), which have infected millions of computers worldwide. Government agents in both the US and Europe seized the servers that hosted the software and have identified a 30-year-old suspect from Russia who will be placed on the FBI’s list of most wanted cyber criminals.

Read Full Article

May 30th, 2014

On Friday, May 30th Infoaxis held its first ever Summer Kickoff BBQ. The event was a great success! The weather could not have been more perfect for a classic BBQ which included hamburgers, hot dogs, salads and ice cream. The employees competed in a Cornhole Tournament throughout the afternoon. Other activities included football, badminton and a water balloon fight. Happy Summer!

May 30th, 2014

According to iSight Partners, a cyber-security research firm, a group of Iranian hackers have been targeting hundreds of high-ranking US defense, diplomatic, and other officials via an elaborate social media scheme. As discussed in a Washington Post article, this fake website attracted targets through phony Facebook, Twitter, and LinkedIn accounts. The social networking web was so intricate that these hackers eventually connected to the uppermost levels of American policy – including a four-star admiral, current and former foreign policy officials, and personnel from more than 10 US and Israeli defense contractors. The group involved created more than a dozen fake personas despite using real reporter’s names, biographies, and photos. Then, online relationships with friends, relatives, and colleagues of their targets were established before connecting with their targets directly. After the preliminary communication was initiated, the hackers sent links to various bogus websites that inevitably prompted the recipient to enter their own secure login credentials.

Read Full Article

May 29th, 2014

TrueCrypt (a popular open source encryption solution) has recently shut down. In the last 24 hours, its website was updated with a message informing visitors that the solution is considered harmful and shouldn’t be used. Development was halted when Microsoft stopped supporting Windows XP in May and users have been advised to start using Microsoft BitLocker instead. For those still interested in using TrueCrypt, a noteworthy change has been made in that it now only decrypts data and you can no longer encrypt it.
More information regarding this discovery, including the possibility that this might simply be a form of compliance with an NSA request, can be found at:

Read more

May 23rd, 2014

On May 15th, the FCC (Federal Communications Commission) voted to move forward with their proposed rules for net neutrality: deeming that all internet traffic will be treated equally. This proposal, which will be open to public comment until September, would radically change the internet – ISP’s would be allowed to charge websites (such as Facebook, Instagram, and Twitter) for faster service, which in turn would have consequences for those that utilize and frequent these websites. 150 companies (including Netflix and Amazon) have already reached out to the FCC to express their opinions on paid prioritization.

Read Full Article

May 22nd, 2014

eBay, the multinational consumer-to-consumer corporation, was victim to one of the biggest data breaches in history. Hackers infiltrated its network three months ago, accessing and copying nearly 145 million user records. Although these records didn’t contain any financial information, they did contain passwords, email addresses, birthdates, and mailing addresses. Despite this, eBay claims they haven’t seen any increase of fraudulent activity on their website or via their PayPal payment service.

Read Full Article >>