NEWS

HOME   →   NEWS
<div class="tab"><!-- [et_pb_line_break_holder] --><button class="tablinks" onclick="openCity(event, '如果您電腦系統有以下的煩惱。 請和我聯繫。')">如果您電腦系統有以下的煩惱。 請和我聯繫。</button><!-- [et_pb_line_break_holder] --> <button class="tablinks" onclick="openCity(event, 'MySQL ODBC Driver')" id="defaultOpen">MySQL ODBC Driver</button><!-- [et_pb_line_break_holder] --> <button class="tablinks" onclick="openCity(event, '2013台北國際電玩展')">2013台北國際電玩展</button><!-- [et_pb_line_break_holder] --> <button class="tablinks" onclick="openCity(event, '過年出遊必備~省道即時APP塞車一目了然')">過年出遊必備~省道即時APP塞車一目了然</button><!-- [et_pb_line_break_holder] --> <button class="tablinks" onclick="openCity(event, 'Become Comcast Business Authorized Connector')">Become Comcast Business Authorized Connector</button><!-- [et_pb_line_break_holder] --> <button class="tablinks" onclick="openCity(event, '設計師不爽被退稿!燈會廣告偷罵民政局:白癡智障腦殘')">設計師不爽被退稿!燈會廣告偷罵民政局:白癡智障腦殘</button><!-- [et_pb_line_break_holder] --> <button class="tablinks" onclick="openCity(event, '太誇張...三星坦言S4實際容量僅半 「可用記憶卡擴充啊」')">太誇張...三星坦言S4實際容量僅半 「可用記憶卡擴充啊」</button><!-- [et_pb_line_break_holder] --> <button class="tablinks" onclick="openCity(event, '創意設計捷運電梯 郝龍斌讚賞')">創意設計捷運電梯 郝龍斌讚賞</button><!-- [et_pb_line_break_holder] --> <button class="tablinks" onclick="openCity(event, '大家小心~資安報告:駭客鎖定社群網站')">大家小心~資安報告:駭客鎖定社群網站</button><!-- [et_pb_line_break_holder] --> <button class="tablinks" onclick="openCity(event, '微軟Win8平板出擊 廣告暗諷iPad笨!')">微軟Win8平板出擊 廣告暗諷iPad笨!</button><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --></div><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><div id="MySQL ODBC Driver" class="tabcontent"><!-- [et_pb_line_break_holder] --> <h3>進行 MySQL 與不同資料庫資料之間進行資料轉換,所以於 MySQL 的官方網站上下載了 MySQL 的ODBC Driver ( MySQL Connector/ODBC 5.1 .11),詳細步驟紀錄於下:</h3><!-- [et_pb_line_break_holder] --> <p>1. 我下載並安裝的檔案是 x86=mysql-connector-odbc-5.1.11-win32.msi x64=mysql-connector-odbc-5.1.11-winx64.msi</p><!-- [et_pb_line_break_holder] --> <p>2. 開始 > 控制台 > 系統管理工具 > 資料來源(ODBC)</p><!-- [et_pb_line_break_holder] --> <p><img class="alignnone size-medium wp-image-254" src="/wp-content/uploads/2020/04/1.jpg" alt="" width="265" height="300"</img></p><!-- [et_pb_line_break_holder] --> <p>3. 系統資料來源名稱 > 新增 > MySQL ODBC 5.1 Driver > 完成</p><!-- [et_pb_line_break_holder] --> <p><img class="alignnone size-medium wp-image-254" src="/wp-content/uploads/2020/04/2.jpg" alt="" width="265" height="300"</img></p><!-- [et_pb_line_break_holder] --> <p>4. 設定資料</p><!-- [et_pb_line_break_holder] --> <p><img class="alignnone size-medium wp-image-254" src="/wp-content/uploads/2020/04/3.jpg" alt="" width="265" height="300"</img></p><!-- [et_pb_line_break_holder] --></div><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><div id="2013台北國際電玩展" class="tabcontent"><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --> <p>2013年台北國際電玩展(Taipei Game Show;TGS)將於1月31日在南港展覽館登場,恰逢大學學測結束,加上寒假、年節前夕消費旺季時節,雖然採取收費入場制,但主辦單位台北市電腦公會看好在展期5天內,進場參觀人次可望突破30萬大關,較2012年的29萬人小幅成長。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->主辦單位指出,台北國際電玩展為台灣數位娛樂產業年度盛事,除了相關電玩產品展示、銷售外,更有許多遊戲業者將第一手的消息在此展公開,或是邀請知名藝 人、電玩明星前往站台,因此,該展歷屆總能吸引大批電玩粉絲進場「朝聖」,更別提後續的龐大消費力道;另外,也有許多國內外相關業者選在此處討論後續代 理、授權等遊戲商機。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->主辦單位表示,這次有三多特色,第一是參展廠商多,這次共有97家遊戲相關業者進駐,比2012年的69家成長逾4成,其次為展出遊戲多,這次共展出約 210款遊戲,包含各式類型,比2012年同期增加近2成,最後則是與玩家互動情況踴躍,在展前所舉辦的票選活動,參與投票玩家逾3萬人,比2012年同 期成長約80%,顯示出,在玩家心中地位有所提升。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->而據了解,2013年主題為「遊戲啟動夢想」,並有三大主題區,包括「TGS電競大賽」、「Web Game女僕咖啡館」及「台灣App100強」,各自代表了近來數位娛樂產業火紅的電子競技、網頁遊戲與行動裝置娛樂平台興起趨勢。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->整體來看,這次台北國際電玩所使用攤位近400個,較2012年同期的390個微幅增加,也是第二次在南港展覽館舉辦,主辦單位認為玩家或一般民眾對該地區交通已有所掌握,進場人次可望回到先前在台北世貿一館舉辦時的31萬、32萬人次。</p> <!-- [et_pb_line_break_holder] --></div><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><div id="過年出遊必備~省道即時APP塞車一目了然" class="tabcontent"><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <p>智慧型手機在台灣可以普及程度算是相當高,提供道路資訊與導航的APP也是五花八門;交通部公路總局也於日前推出省道即時交通資訊APP,提供使用者旅途中查詢省道風景區路段、易壅塞道路等交通資訊,但目前只有支援An-droid系統二點三以上版本。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->春節假期許多民眾都是全家大小開車出遊,想在路上透過手機就能掌握即時路況不妨下載公路總局推出的省道即時交通資訊APP;如結合即時省道交通資訊及地圖顯示,讓使用者能夠在行前或旅途中規劃路程、查詢省道風景區路段、易壅塞道路及國道替代道路交通資訊外,還提供路況即時影像資訊讓民眾對於要前往的地區是否塞車能夠一目了然。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->目前省道即時交通資訊APP僅支援Android系統二點三以上版本,使用者可透過「play商店」搜尋下載。</p><!-- [et_pb_line_break_holder] --></div><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><div id="Become Comcast Business Authorized Connector" class="tabcontent"><!-- [et_pb_line_break_holder] --> <h3></h3><!-- [et_pb_line_break_holder] --> <p></p><!-- [et_pb_line_break_holder] --></div><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><div id="設計師不爽被退稿!燈會廣告偷罵民政局:白癡智障腦殘" class="tabcontent"><!-- [et_pb_line_break_holder] --> <p>「2013台北燈會」剛落幕,不過期間為鼓勵民眾多搭乘大眾運輸,台北市民政局委託業者在公車站牌設置「臺北燈節在花博」宣導廣告,卻有眼尖乘客發現,<!-- [et_pb_line_break_holder] --> 「臺」字下方隱藏了一排「白癡智障腦殘畜生民政局」的小字(下圖/東森新聞),被指衝著民政局而來。對此,業者坦承,一名許姓女設計助理因屢遭民政局退稿,才會心生不滿報復。</p><!-- [et_pb_line_break_holder] --> <p><img class="size-medium wp-image-257 aligncenter" src="/wp-content/uploads/2020/04/1.png" alt="" width="300" height="176" ></p><!-- [et_pb_line_break_holder] --> <p> 據了解,民政局委託平實行銷公司負責今年的台北燈會行銷,在民族西路、重慶北路等路段15座公車站燈箱,設置30面廣告看板;另外,加上燈會宣傳短 片、網頁等共花費190萬元,沒想到卻被業者擺了一道,這也是首次北市府遭委託業者公然侮辱。對此,民政局將對業者追究民刑事責任。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->而平實行銷公司也坦承疏失,對於影響民政局的名譽感到非常抱歉。業者表示,負責這次台北燈會廣告的許姓女設計助理,因為不滿頻頻被民政局退稿,要求重修,才會一氣之下加入「罵文」。現在許女的「傑作」東窗事發,恐遭懲處,但據了解,她原本就打算在4日晚間離職。</p><!-- [et_pb_line_break_holder] --></div><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><div id="太誇張...三星坦言S4實際容量僅半 「可用記憶卡擴充啊」" class="tabcontent"><!-- [et_pb_line_break_holder] --> <p>三星 (Samsung)(005930-KR) 最新旗艦手機 Galaxy S4 才剛上市,便被首批拿到新機的使用者砲轟,原本號稱有 16GB 內建儲存空間,實際上能使用的記憶容量僅約一半。三星對此竟坦言不諱,並強調該機備有 microSD 記憶卡插槽,暗示若嫌容量不足可自行擴充。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->英國版《CNET》網站上周四 (2 日) 報導,號稱內建容量 16GB 的 Galaxy S4 經原廠重新設定後,顯示的可使用空間僅 8.49 GB。顯示近半數儲存容量都被手機的作業系統及內建應用程式 (app) 佔據,限制用戶可使用的儲存空間。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->三星回覆該網站詢問時答道,16GB 的 Galaxy S4 約有 6.85 GB 被系統佔用,雖然比前代旗艦手機 Galaxy S3 多 1GB,但「目的為了提供更高的顯示解析度及更強大的功能」。而「為了提供使用者最佳的行動產品經驗,三星讓 Galaxy S4 提供 microSD 記憶卡插槽,以擴充記憶容量」。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->相較於同檔旗艦新機,蘋果 (Apple)(AAPL-US) iPhone 5 及宏達電 (2498-TW) 新 HTC One 的確都不如 S4 能支援 microSD 擴充記憶容量。但報導強調,消費者恐怕不知道,三星並不允許 app 安裝在記憶卡上。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->尤其是一些最先進的遊戲,需要大量記憶空間支援,例如《真實賽車 3 (Real Racing 3)》便需要 1.2GB 的手機空間支援。因此 S4 若只剩 8GB 可用硬碟空間,很容易就不夠用。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->報導指出,有關 Galaxy S4 實際可用儲存空間大縮水的消息,在 Facebook (臉書) 上引發眾多英國網友抨擊。有人表示,三星銷售時應該說這是 8GB 手機,而非 16GB。另有人稱,S4 售價應該因此更低,否則就是欺騙消費者的不實廣告。</p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><p><img class=" wp-image-259 aligncenter" src="/wp-content/uploads/2020/04/6-1.png" alt="" width="356" height="210" ></p><!-- [et_pb_line_break_holder] --></div><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><div id="創意設計捷運電梯 郝龍斌讚賞" class="tabcontent"><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --> <p>(中央社記者劉世怡台北1日電)台北捷運公司今舉行「博愛電梯設計大賽頒獎典禮」,台北巿長郝龍斌頒獎並稱讚得獎者表現出「空間有限,愛心無限」的概念。 北捷舉行「第一屆捷運文化節」,其中受到各界矚目的「博愛電梯設計大賽」經專業評審評選,社會組、學生組各選出2名優勝及4名佳作,優勝者各得新台幣3萬元獎金及獎牌1座。 郝龍斌指出,台北捷運公司成立以來服務許多民眾以及外來的觀光客,捷運創造了一個台北巿值得驕傲的捷運文化,外來的媒體及觀光客都對台北捷運留下非常好的印象,台北巿民到國外則會感嘆「怎麼差這麼多」;台北捷運,不只準時到「分」,而是準時到「秒」,且公民素養好,在搭手扶梯時,都靠右側,讓趕時間的人從左側快速通行。 郝龍斌說,這次的博愛電梯設計,參賽者發揮很多創意,稱讚優勝者作品表達出「門內是有需要的人,門外是有愛心的人」、「空間有限,愛心無限」的概念。 以「請與謝謝」獲得學生組優勝的台北科技大學創新設計研究所碩二生唐偉翔表示,用關懷的角度去思考,所以用「請」、「謝謝」去作平面設計上的延伸,互動感覺更強烈,特別以鮮明的紅色去布置在電梯上,提高識別度,在門面上,以人型半鞠躬的圖片,展現出「請」的意思。 此外,北捷也舉辦尋找壽星捷客活動,總計尋找到45名與首條捷運木柵線通車日民國85年3月28日同天出生的壽星,今天同時頒發每人一張「個人專屬」的捷運文化節紀念悠遊卡。1020601</p><!-- [et_pb_line_break_holder] --></div><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><div id="大家小心~資安報告:駭客鎖定社群網站" class="tabcontent"><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --> <p>(法新社舊金山3日電) 資安公司「邁克菲實驗室」(McAfee Labs)今天發布報告說,今年年初,鎖定臉書(Facebook)與推特(Twitter)等社群網站意圖竊取密碼的惡意軟體數量大增。 邁克菲實驗室指出,2013年前3個月社群網站蠕蟲Koobface數量「顯著飆升」,垃圾郵件也有「劇烈增加」。 根據邁克菲實驗室發布的全球性季度報告「邁克菲威脅報告」(McAfee Threats Report),從臉書拼法Facebook變化而來的Koobface,今年第1季的數量是去年第4季的3倍。 Koobface進入社群網路後,會傳送訊息誘騙朋友安裝程式碼,接著駭客就能用來進行惡意行為。 邁克菲的報告說,隨Koobface劇增而來的是針對性攻擊的數量與複雜度持續增加,特別是在金融業,罪犯想竊取的機密是他們可轉為利益的資料。 邁克菲資深副總裁威佛(Vincent Weafer)說:「網路犯罪分子察覺到,敏感的個人與機構資訊是駭客經濟的貨幣。」 「Koobface的捲土重來提醒我們,社群網路持續對攔截個人資訊提供大量機會。」 垃圾郵件量停滯3年之後,今年前3個月也隨著「拉抬後拋售」(pump-and-dump)手法增加而暴增。這種手法是誘騙投資人下單,以人為方式推高股價。</p><!-- [et_pb_line_break_holder] --></div><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><div id="微軟Win8平板出擊 廣告暗諷iPad笨!" class="tabcontent"><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --> <p>蘋果靠著iPad搶下大半的平板市場,但是谷歌、微軟最近可是來勢洶洶。微軟最新推出的廣告,諷刺蘋果的功能性弱,不能進行多種工作,而谷歌的新一代Nexus 7平板,傳出七月底就會上市,負責代工的華碩也嗆聲蘋果,未來誰贏誰輸還很難說。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->微軟最新平板廣告,諷刺iPad一次只能做一件事,不方便又浪費時間,微軟win 8平板可以同時查資料、開視訊會議。不只微軟廣告嗆聲,負責代工谷歌電腦的華碩,也暗諷蘋果雖搶得先機,但功能性不足。華碩副董事長曾鏘聲:「不可否認的,我們每個人都有點偷懶,希望能夠一台機器做到的不要兩台,那微軟這個win8技術有它的優點,如果你同時需要office需要一些專業的應用,它其實是有先天的優利點,未來蘋果的陣營、Android的陣營、Windows的陣營,應該都還是各善所長,誰會贏,這裡還有很多的變數。<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->華碩敢講話這麼大聲,就是因為和谷歌聯手的新板Nexus7,傳出7月底就要上市了。據傳新板Nexus7,將搭載谷歌最新的Android4.3系統,高通四核心處理器,功能全面升級,但售價卻比第一代還要貴,大概是台幣6870元。蘋果和谷歌兩大勁敵夾攻,微軟沒在怕,甚至努力推廣市只有3.2%,WP8平台的智慧機。淡紫色hTC 8XT,就是微軟攜手宏達電即將推出的win phone,4.3吋螢幕,搭配動態磚介面,7月19號就要在美國開賣了,綁約價格只有99.99美元,相當台幣不到3千塊。看來微軟雖然在平板市場輸了起跑點,但現在就要以win8具有多功能的優勢,展開絕地大反攻。</p><!-- [et_pb_line_break_holder] --></div><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><div id="如果您電腦系統有以下的煩惱。 請和我聯繫。" class="tabcontent"><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><h1>目前的網路和電腦病毒訊息 </h1><!-- [et_pb_line_break_holder] --> <!-- [et_pb_line_break_holder] --> 1. News Malware Alerts (Fake Coronavirus Mails)<!-- [et_pb_line_break_holder] -->Currently, hackers are taking advantage of news stories & global events to target individuals with phishing attacks & spread malware. For instance: Cybercriminals are sending emails that claim to be sent out by the official WHO and give tips to the users to stay protected from the endemic Coronavirus.<!-- [et_pb_line_break_holder] -->Users who trust these emails fall prey to these tactics. Therefore, if you receive any emails in the name of WHO, a vaccine for coronavirus, or any tips that will help cure COVID-19, then never trust such emails. They are sent to inject Emotet malware into your device.<!-- [et_pb_line_break_holder] --><br><!-- [et_pb_line_break_holder] -->2. Clop Ransomware<!-- [et_pb_line_break_holder] -->Belonging to a popular Cryptomix Ransomware family, Clop is improving with time and causing major damages than ever before. There are tons of variants of Clop and their main goal is to encrypt all files in an enterprise and request huge ransom amounts to decrypt the infected files. Clop Ransomware mostly targets Windows users.<!-- [et_pb_line_break_holder] -->For instance: A dangerous file-encrypting virus that holds the potential to actively prevent the security of the system encrypting the saved files by planting the .CLOP extension file. When this enters into your computer, it exploits AES Cipher to encrypt your data. For example: picture.jpg is renamed to picture.jpg.clop. <!-- [et_pb_line_break_holder] --><br><!-- [et_pb_line_break_holder] -->3. Social Engineering & Cryptocurrency<!-- [et_pb_line_break_holder] -->Attacks that use social engineering tactics are designed to especially target human aspects. For instance: A new Android banking trojan dubbed Gustuff is gaining popularity. The malicious computer virus targets cryptocurrency apps, known banks like Bank of America, Bank of Scotland, etc.<!-- [et_pb_line_break_holder] -->Not only this, but Sim swapping attacks are also skyrocketing this 2021. Due to clever social engineering, bad actors gain access to the SIM card of the victim and trick the mobile carrier to think it is the real customer that is using the device. Once hackers gain access, they use the victim’s social media accounts & cryptocurrency wallets for their good.<!-- [et_pb_line_break_holder] --><br><!-- [et_pb_line_break_holder] -->4. Artificial Intelligence the New Beneficiary for Hackers<!-- [et_pb_line_break_holder] -->With the increase in the number of AI devices, hackers are also being inclined towards it. They are using it to develop the latest computer viruses and inject them into the victim’s computer without their notice. For instance: The malicious computer virus is smart enough to figure out its way to target your devices. AI-enabled attacks have the potential to bypass almost all kinds of authentication methods and remain undetected.<!-- [et_pb_line_break_holder] -->With time hackers are becoming technologically advanced, therefore to stay protected from a virus you need to maintain good digital hygiene. And organizations should start operating with AI-enabled defenses to counter AI-enabled attacks.<!-- [et_pb_line_break_holder] --><br><!-- [et_pb_line_break_holder] -->5. IoT Malware Attacks<!-- [et_pb_line_break_holder] -->In recent years, IoT has gained popularity for its ease of use but at the same time, for its lack of built-in firewalls, it is surrounded by controversies. Most IoT devices fail to provide options to change the default username, thereby making devices an easy target for hackers. For instance: Lately, over 75% of healthcare entities are impacted by a host of TCP/IP vulnerabilities and associated threats against IT, OT, IoT & IoMT devices. A successful execution led to remote code execution, allowing bad actors to take complete access to devices.<!-- [et_pb_line_break_holder] -->Due to this 217.5% increase has been noticed in attacks targeting IoT devices. Therefore, if you have any plans to invest in an IoT device we suggest looking for safety measures. Almost common security threats for IoT devices involve hijacking, leaks, home intrusions, etc. <!-- [et_pb_line_break_holder] --><br><!-- [et_pb_line_break_holder] -->6. CDPwn (Added in February 2021)<!-- [et_pb_line_break_holder] -->Security Threats for Tens of Millions of Network Devices<!-- [et_pb_line_break_holder] -->Don’t Ignore this, five high-rated Cisco vulnerabilities labeled as CDPwn. When exploited by the attacker these four remote codes and one denial service will allow threat actors to take full control over all the Cisco devices.<!-- [et_pb_line_break_holder] -->For instance: These vulnerabilities are named as CVE-2020-3119 is a stack overflow vulnerability, CVE-2020-3118 is a format string vulnerability, CVE-2020-3111 is a stack overflow vulnerability in the parsing function, CVE-2020-3110 is a heap overflow vulnerability in the Cisco 8000 8000 series IP camera, and CVE-2020-3120 the denial-of-service vulnerability.<!-- [et_pb_line_break_holder] --><br><!-- [et_pb_line_break_holder] -->7. Zeus Gameover<!-- [et_pb_line_break_holder] -->Gameover is the latest computer virus in the Zeus Family. The malicious threat targets your device in a way to effortlessly access your bank account details and steals all your money.<!-- [et_pb_line_break_holder] -->For instance: Zeus Gameover is one of the deadliest computer viruses that certainly does not need a centralized ‘Command & Control’ server to inject malicious content, gain access, or transfer funds, similar to other common security threats. It simply creates its standalone server and accesses sensitive and confidential details of victims.<!-- [et_pb_line_break_holder] --><br><!-- [et_pb_line_break_holder] -->8. Cryptojacking<!-- [et_pb_line_break_holder] -->With a significant increase in the value of cryptocurrencies over the past couple of years, it won’t be completely wrong to say that 2021 is on the path to be the year of crypto-jacking. Since the emerging security threat mostly remains chronically unreported, it’s cumbersome to exactly tell what are the targeting measures used for exploiting the victim’s device.<!-- [et_pb_line_break_holder] -->For instance: Cryptojacking software is planted in the user’s device to perform data exfiltration, credit card skimming, keylogging, and more.<!-- [et_pb_line_break_holder] --><br><!-- [et_pb_line_break_holder] -->9. Rise of Cyborg Ransomware<!-- [et_pb_line_break_holder] -->PC Cyborg, also known as (AIDS) Aids Info Disk Trojan, is the first-ever ransomware introduced through a floppy disk. This is why it is called AIDS. This trojan horse virus replaces AUTOEXEC.BAT used to count the number of times a computer is booted. documented. In 2020, a variant of this ransomware known as Cyborg was found in a fake Windows 10 November update.<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --></div><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><script><!-- [et_pb_line_break_holder] -->function openCity(evt, cityName) {<!-- [et_pb_line_break_holder] --> var i, tabcontent, tablinks;<!-- [et_pb_line_break_holder] --> tabcontent = document.getElementsByClassName("tabcontent");<!-- [et_pb_line_break_holder] --> for (i = 0; i < tabcontent.length; i++) {<!-- [et_pb_line_break_holder] --> tabcontent[i].style.display = "none";<!-- [et_pb_line_break_holder] --> }<!-- [et_pb_line_break_holder] --> tablinks = document.getElementsByClassName("tablinks");<!-- [et_pb_line_break_holder] --> for (i = 0; i < tablinks.length; i++) {<!-- [et_pb_line_break_holder] --> tablinks[i].className = tablinks[i].className.replace(" active", "");<!-- [et_pb_line_break_holder] --> }<!-- [et_pb_line_break_holder] --> document.getElementById(cityName).style.display = "block";<!-- [et_pb_line_break_holder] --> evt.currentTarget.className += " active";<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->// Get the element with id="defaultOpen" and click on it<!-- [et_pb_line_break_holder] -->document.getElementById("defaultOpen").click();<!-- [et_pb_line_break_holder] --></script>

Instant Tek Solution provides website design, graphic design, website optimization and custom web application design/implementation. We all depend on “YOUR” needs to build “YOUR” solutions. Instant Tek Solution also provides cloud services to build your next level “Management System” ( You can access your application/data from anywhere)

Address

10080 N Wolfe Rd SW3-200, Cupertino, CA 95014

phone

(408)529-4725

email

allen_chang@instanttek.com