It is widely known that the infamous Stuxnet malware was transported into a protected Iranian network using a USB flash drive. And now, it appears that whistle-blower Edward Snowden also used the humble USB flash drive to single-handedly exfiltrate top-secret information past the various security measures of the secretive National Security Agency.
And when you think about it, do you honestly believe that the United States is the only government engaging in such activities?
United States intelligence agencies have been secretly mining data from major Internet companies based in the U.S.
Among the new products and announcements is a somewhat unorthodox deployment suggestion: To use its new 5mm ultrathin HDD in a tablet.
While sufficient time and diligence may help increase the likelihood of finding the correct attacker, just because the track passes through an IP address from China does not automatically mean it was the source of a cyberattack.
You may have read about my decision to move to a Mac late last year when I got the Retina MacBook Pro. As I wrote earlier, my journey was filled with various difficulties, including figuring out the Mac equivalent of my often-used shortcuts, and figuring out various design differences.
You could say I was addicted to the speed, but I was so impressed that, since then, I have not purchased a laptop without a SSD. Believe me when I say that no users will willingly switch back to a normal HDD after having experienced what an SSD can offer them.
After using various versions of the Windows operating system for almost two decades, I decided to get a Retina MacBook Pro in December last year.
While I don't believe that the PC is dead, I am of the opinion that tablets can deliver tangible benefits when deployed in a way that leverages their connectivity and affordability.
Once the optional security feature is enabled, there is no doubt that two-factor verification will protect users. But just as it can stymie hackers, it can also create trouble for users who don't pay attention to the setup procedure. They could find themselves locked out of their own accounts, should they lose their mobile phones, for quite some time.