4GoodHosting
Live Help
24/7 Support
4GoodHosting Canada 1 866 708 4678
Blog Menu G
Search
Categories
m

Month: October 2021

adobestock 61517490
reading time Reading Time: 8 minutes

151 isn’t the biggest number in the world, but it’s not the smallest either. 10.5 million? That’s a big number indeed and where we are going with this is that there in an ongoing fraud campaign making its way around the web right now called Ultima SMS that people should be made aware of given the sheer scale of it and just how many people could be affected. 151 is the number of Android apps that this campaign has been identified with (so far) and that 10.5 million figure is the number of times those specific apps have been downloaded. Most malware is much more deliberately malicious, but that’s not to take away from the seriousness of Ultima SMS and why people should be made aware of it (and why we’re choosing to make it our subject this week). Here at 4GoodHosting we’re like any good Canadian web hosting provider in that we know that people don’t like surprises when they’re the type that end up costing them more money. That’s what makes the Ultima SMS subscription scam so noteworthy – it upgrades users to premium subscription memberships without them being aware of it. Now the question obviously becomes what would be their gain in doing this. They get a cut from the monies gained by increasing subscription rates involuntarily. Instead let’s look at those very newsworthy scam, as security concerns related to apps downloaded 10+ million times definitely makes it newsworthy. Gone – Just Not Quickly Enough The good news here is that Google wasted no time in removing the apps, but those multi-million downloads have worked out to millions of dollars in fraudulent subscription charges already. The way they drew unsuspecting users to the bait was with discount apps, games, custom keyboards, QR code scanners, video and photo editors, spam call blockers, camera filters, and more. Once one of the affected apps was launched for the first time and using mobile data, the location and IMEI is changed to match the language of the country. The app would then prompt the user to enter their mobile phone number and email address to become aware of the program's features...

You may find this interesting too.
adobestock 200146317
reading time Reading Time: 6 minutes

Cyber security is certainly turning out to be one of the buzzwords of the 21st century, or at least so far and depending on whether you’re in certain circles. It is also certainly something that anyone running a business would have never even heard of or had to consider in the days before businesses started to up shop along the Information Superhighway. But nowadays nearly all of them who have taken their business online will be all to familiar with terms like malware, ransomware, and the like. There’s always going to be bad actors but nowadays they’re a whole lot more inconspicuous in the digital space. There’s been plenty of documented cases where big businesses have taken big hits because of cyber attacks, but fortunately cloud computing technology has really stepped up to be a valuable and powerful ally in the fight against cyber crime. The reason this is noteworthy for us here at 4GoodHosting is the nature of what we do lends itself to taking an interest in something that will definitely be a forefront issue for those websites hosted and in operation because of e-commerce interests. We imagine this would be true for any good Canadian web hosting provider. So we figured this would be an excellent topic to delve into for this week’s entry, and explain in more detail how having the benefits of cloud computing on the side of Enterprise security is such a big plus for anyone who has reasons to be concerned about how air-tight their website and data related to their business operation is or is not depending on the circumstance. New Rules Enterprise organisations today have no choice but to play by a new set of cyber and physical security rules. There’s not stopping the advances hackers are making, and they will continue to find new and faster ways to get past security protocols. It’s fair to say now that traditional models where cybersecurity and physical security teams operate as separate entities can no longer ensure being defended against the most recent and revamped threats. Converged cyber and physical security teams are great, but a key piece of a successful security strategy...

You may find this interesting too.
adobestock 186885581 150x150
reading time Reading Time: 5 minutes

Neither of the two giants in Apple and Microsoft do much in the way of making their devices easily repairable or upgradeable, and while trying to keep their stuff proprietary as much as possible is understandable it’s not good how so many PCs and other computing devices are discarded and end up as electronic waste instead of being repaired. The basics of electronic device repair aren’t that difficult to get, and you might be surprised what can be done with know how, a steady hand and some soldering skills. Working on devices that are able to access the web is a huge part of daily life for so many people, and it will be beneficial to try and limit the amount of e-waste we create when getting rid of ones that could still have a longer working life. This is why it’s good news that Microsoft has announced that they are going to make desktop and notebook PC repair much more accessible to people. This will also have huge benefits for providing fully functional computing devices to developing regions of the world where they will assist with education and other interests. Trying to minimize their environmental footprint is a priority for any quality Canadian web hosting provider in the same way it is for all businesses these days, and at 4GoodHosting we see the value in making people aware of news like this that is in line with environmental interests related to digital devices. E-waste is a problem, and it is going to be very beneficial if people can have their computers and other devices repaired more easily so they don’t have to keep buying new ones and furthering the cycle. Around a Trend A large portion of the carbon emissions associated with the devices we own are made during manufacturing. Replacing products before the more real end of their working life causes those emissions, pollution, natural resource use, and land degradation associated with extracting and refining raw materials go way up and there is more toxic e-waste polluting the environment in places like Agbogbloshie, Ghana and Guiyu, China. The White House is already moving towards legislation that will have...

You may find this interesting too.
adobestock 144746530 150x150
reading time Reading Time: 5 minutes

Ever since the web was in its infancy and URLs were just starting to be a thing, internet names that are TLDs (Top Level Domains) are administered by ICANN, a centralized organization that has outlived its usefulness for managing internet names in the opinion of many knowledgeable people in the industry. It’s only very recently that legitimate alternatives to this monopoly of-sorts have come into existence, but the one that’s really generating some buzz these days is Handshake. It is the exact opposite of ICANN, and in particular with the way it is a decentralized naming solution for the Internet that is powered by blockchain technology – another major disruptor in the industry that we’ve also touched on here on a number of different occasions. HNS is the abbreviation for the Handshake naming system, which is a peer-to-peer network and decentralized system using blockchain as a means of offering better control, freedom, and security of the domain and website. As you’d expect, this sort of development is the type that comes up immediately on radar for those of us here at 4GoodHosting in the same way it would for any good Canadian web hosting provider that likes to have its thumb on the pulse of web hosting technology and options that become available to people who need to claim their spot on the web and use it to their personal or business advantage. The appeal of HNS naming is that it is line with decentralizing the web and allowing for a more fair reorganizing of the Internet. So how does Handshake domain naming work, and what exactly make it better for individual users? That’s what we’ll look at this week. Handshake Domains – How Do They Work? Let’s start here with a basic refresher on domain names. All websites accessible on the Internet are found on servers identified using Internet Protocol (IP) addresses. Users aren’t expected to know IP addresses, so internet names are mapped to their corresponding servers by means of a domain name system (DNS). DNS is not centralized, but the ultimate control of names via the DNS system is held by a limited number of interest groups...

You may find this interesting too.
On This Page G
Explore 4GOODHOSTING
Copyright © 2025 4GoodHosting. All Rights Reserved.
+1 866 708 4678