Courtney Arthur, Author at Root Level Technology

Author: Courtney Arthur, Author at Root Level Technology

What’s The Difference Between A RTOS And A GPOS?

With the Internet of Things, RTOS’s have been gaining a great deal of popularity lately. After all, they’re much better-suited for use in embedded systems than GPOS’s, and far easier to work with in many cases, as well. If the previous two sentences sounded like Greek to you, then don’t worry –  you aren’t alone. It can be easy to forget that not everyone understands all the buzzphrases and insider terminology that’s bandied about around a particular technological development. Today, I’d like to demystify things a bit. Let’s talk about some of the most important terms in embedded computing. . They actually aren’t as complex as you might think. You probably already know what a General Purpose Operating System is […]

Continue reading

Wannacry Ransomware

In this day and age where we’ve never been more attached to our gadgets and computers, imagine if your laptop was literally held ransom? That’s the reality thousands of individuals and corporations woke up to on the May 12th, 2017 when a global malware campaign, called WannaCry (also called WCry or Wannacryptor), began.   This malware is a ransomware variant, and some of its most notable victims are the United Kingdom’s National Health Service (NHS), Telefonica in Spain, Renault in France and some Chinese universities. This article aims to reveal key details about this rapidly growing malware threat and how to protect your computers from it.   How does WannaCry Operate? Most malware attacks are focused on security vulnerabilities on […]

Continue reading

Three Critical Steps To Protecting Your Business From Mobile Malware

  Mobile malware is on the rise. According to a recent Kaspersky survey, malicious software targeted at mobile devices increased by nearly 1.7 times between Q1 and Q2 2016. It’s an upward trend that shows no signs of slowing – and if you haven’t adjusted to it yet, it’s long past time that you do. Smartphones have, after all, become ubiquitous in enterprise. Everybody uses them, even if you think they don’t. If you get complacent and fail to secure them, you will eventually suffer a breach. It’s not a question of if – it’s a question of when. MDM, MAM, and MCM Standing for Mobile Device Management, Mobile Application Management, and Mobile Content Management respectively, these three abbreviations are […]

Continue reading

Protecting Yourself Against Five Lesser-Known Security Threats

It’d be nice if every single security threat that faced your organization was glaringly obvious – a massive botnet here, poorly-disguised malware there. Unfortunately, in the real world, things are often a bit subtler. And the threats you need to guard your enterprise data against aren’t all that clear. If you’re reading this, you’ve probably taken measures to protect things like mobile devices and desktop PCs. You’re aware of the importance of regularly-updated security software, and the need for a firewall and access controls. But you’re probably overlooking quite a few things too – and doing so could cause a breach. Here are just a few security risks you might have forgotten about – have you addressed them all? Local […]

Continue reading

Do You Have A Game Plan For IoT-Backed DDoS Attacks?

Last year, I wrote a piece about how the Internet of Things could pave the way for some of the biggest botnets in history. I take no pleasure in the fact that recent events have proven me right. From the recent attack targeting Krebs On Security (which caused him to be dropped by Akamai) to the 1 terabyte per second flood hurled at hosting provider OVH in September, things are getting worse – much worse. I’m talking entire swathes of the Internet brought to its knees. And yet efforts to hold manufacturers accountable, to demand that IoT companies start injecting more security into their products, still lag behind. To make matters worse, one of the recent attacks – the one […]

Continue reading