Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

Continue reading

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

Continue reading

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

Continue reading

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals--but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned supercomputer.

Continue reading

Hack a Hospital and Get Blacklisted By Other Hackers

Hack a Hospital and Get Blacklisted By Other Hackers

Hackers are notorious for committing cybercrimes and exploiting what seems like everybody and anybody. Yet, just as there exists honor among thieves, there’s an unwritten rule within the hacking community: leave hospitals alone.

Continue reading

For NATO, Cyberspace is Today’s Frontlines

For NATO, Cyberspace is Today’s Frontlines

It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and sea, cyberspace is now an operational domain, a place that can be considered a battlefield.

Continue reading

Drugs, Assassins For Hire, Weapon Sales, and More: All Conveniently Found On the Web

b2ap3_thumbnail_cybercrime_black_market_400.jpgThe Internet is a fascinating and wonderful place full of great, informative resources and websites, but it’s also home to online markets for illegal and unethical practices. These hotbeds of criminal activity are a danger not only to your business, but to everyone who uses the Internet.

Continue reading

Alert: New CryptoJoker Ransomware May Be the Worst Ransomware Yet

b2ap3_thumbnail_ransomware_hostage_400.jpgModern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, displaying a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall are somewhat manageable, a new variant called CryptoJoker makes it borderline impossible to recover your files.

Continue reading

Customer Login


Latest Blog

Let me ask you this: would you trust every one of your team members with a key to your house? Of course not, right? After all, what if someone lost their copy or had it stolen from them? So, if you wouldn’t trust your entire team with access to your home, why on earth would you trust them with carte blanche access to your entire business and all of its data? That’s just it… you wouldn’t. 

Contact Us

Learn more about what Indevtech can do for your business.

Indevtech Incorporated
Pacific Guardian Center, Mauka Tower
737 Bishop Street, Suite 2070
Honolulu, Hawaii 96813-3205

indev badge footer