-October 3, 2018-
On September 28, 2018 Facebook announced another massive data breach. This is another glaring example of how large online companies that are entrusted with personal and sensitive data are treating the protection of this information. With the financial resources that are available to these companies, my question is, “Why aren’t those resources being better utilized?” I believe the answer to this question is simple, they are living in denial! The denial that they are diligently protecting it. That’s the impression they are portraying to the billion plus Facebook members.
But it’s a lie! A lie that has major consequence’s! Facebooks main source of revenue generation is their members. They need those members, so they can charge premium digital advertising dollars by showing site traffic to companies who want to exposure their products or services to a mass market. Facebook members are a captive audience. Every time a member logs into their account, they are inundated with targeted advertising. Targeted audiences that are driven by Facebook developed marketing analytics. Losing members who have lost faith in Facebook means smaller revenue streams, which ultimately adversely affects Facebook’s publicly traded share value.
Another issue is companies who give a potential new or existing customer the option of either using their email address, or by their Facebook Login credentials to create or access their account. Its quite evident that those who chose the latter are giving information, not only to the company they want to become a member of, but, giving Facebook yet another string of vital data to be used in their marketing program. The recent breach of Facebook has given those who have gained unauthorized access to Facebook accounts, the ability access accounts unrelated to Facebook because they used their Facebook account login credentials.
So, Mr. Zuckerberg, are you sure that Facebook has the internal capabilities of protecting your members information? Or? Perhaps it’s time that you reach out to a company that has developed a software program that will stand guard over your members most sensitive data, protecting them from these unauthorized intrusions with 100% statistically proven reliability! We have reached out to you, and patiently await your response.
Omnipotent Technologies™ Announces Agreement With Oracle™
August 24, 2018
Rudy Procaccianti, a Partner in Omnipotent Technologies™ is pleased to announce that it has entered into an agreement with Oracle™ for a Hybrid Cloud Platform to ready the release of their iGuardian360™ software program.
This is an exciting time for us as we are now at the threshold of realizing the release of our software program that will forever change the dynamics in the way AV programs are measured.
Omnipotent Technologies™ Finishes Real-Time Beta Testing For iGuardian360™
August 10, 2018
Rudy Procaccianti, a Partner in Omnipotent Technologies™ announces that iGuardian360™ has completed real-time beta testing for its software program by entering the Dark Web to expose a computer that was protected by its revolutionary software program, that is designed to protect devices and networks from cyber-attacks as well as malicious viruses and malware. It detected 4,791 attempts to infect the device with a variety of malicious viruses, and iGuardian360™ thwarted every attempt for a *100% accuracy rate!
In a random test, iGuardian360™ analyzed various web news articles posted on MSN™ to verify that those articles did not contain links to product advertising or additional news articles that could possibly contain viruses. iGuardian360™ discovered 1,052 that subsequently contained links and found malicious viruses/malware.
We have posted a screenshot to use as a reference as to what would have happened if our device wasn’t being protected by iGuardian360™. This warning notice populated in a separate Microsoft Edge™ Explorer Page that was captured in iGuardian360™’s ‘Catch & Release™’
As you can see by the wording on the Microsoft Edge™ Explorer Page, it gave a fraudulent notice that the device was infected, and to immediately call the toll-free number for assistance, and that any attempt to address the issue would have catastrophic repercussions. iGuardian360™ scanned the web for any information related to that toll-free number, and found a voluminous number of instances where it was used to perpetrate fraud on unsuspecting web browsers.
In addition, once that fraudulent notice populated in a separate Microsoft Edge™ Explorer Browser Page, that page could not be closed because it froze the GUI function.
After iGuardian360™ deleted the threat, we went back to find the page that populated the malicious virus, and the web address was no longer valid, as referenced in the 'screenshot' below. While iGuardian360™ is addressing a valid threat, it simultaneously tracts the web address, stores it in our database and sends a notice to whomever is attempting to infect the unsuspecting device or network, by displaying a notice that appears on their monitor/screen informing them that they have been TAGGED!
Our questions to Microsoft™ are; “why didn’t ‘Bit Defender™’ detect these malicious links?” And; “why hasn't Microsoft™ developed a program to allow a user to delete those fraudulent webpages?”
iGuardian360™ not only works seamlessly to detect and defend these types of attacks, it does so flawlessly, and without any unnecessary latency issues.
*Our legal counsel asked us to include this asterisks mark, with a threat defense percentage of 99.999%.
© 2018 ALL RIGHTS RESERVED | USE BY WRITTEN PERMISSION ONLY
iGuardian360™, Catch & Release™ & Omnipotent Technologies™ Are Designate Trademarks of Omnipotent Technologies™
Microsoft™, Microsoft Edge™ & Bit Defender™ Are Designate Trademarks of Microsoft™
Omnipotent Technologies™ Finishes Beta Testing iGuardian360™
July 31, 2018
Rudy Procaccianti, a Partner in Omnipotent Technologies™ announces that it has completed its beta testing for their antimalware/virus software program iGuardian360™
Through its proprietary Catch & Release™ coding technology, it protects any device from downloading a malicious virus by containing it in a Cloud secured sector, or within the software program itself that emulates the actual downloading into a device or network, to detect any malicious code that may be imbedded that is designed to infect the device, system, or network.
If a virus is detected, iGuardian360™ automatically disables the malicious code and performs a Carbonizing™ process to completely remove it.
iGuardian360™ is a standalone malware program developed for individual devices as well as large mainframe networks and Cloud-based Infrastructures.
© 2018 ALL RIGHTS RESERVED | USE BY WRITTEN PERMISSION ONLY
Omnipotent Technologies™ | iGuardian360™ | Catch & Release™ | Carbonizing™ ARE DESIGNATE TRADEMARKS & SERVICEMARKS of Omnipotent Technologies | ALL RIGHTS RESERVED | USE BY WRITTEN PREMISSION ONLY
With the proliferation of computer threats such as malware, malicious browser helper objects, browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware, spyware, URLs, spam, scam, phishing attacks, online identity theft, online banking attacks, social engineering techniques, advanced persistent threats, botnet DDoS attacks, protect has become a top priority!
iGuardian360™ immediately eliminates the threat for these types of viruses by containing them within our proprietary software program by emulating the operating system. It quarantines and analyzes the code utilizing our Catch & Release™ function and decides if it's safe to download and install. If a virus is detected, there isn't any need for human interaction because iGuardian360™ automatically begins the process of instantaneously neutralizing the suspected virus, then performs the final step by Carbonizing™ it. iGuardian360™ also captures the ISP address to assist with the tracking of where the suspected virus originated from.
Companies possess valuable private data making network security a priority. Security-conscious businesses usually take additional measures to protect their networks beyond what people do for their home networks.
To prevent unauthorized devices from joining a business network, companies employ centralized sign-on security systems. These require users to authenticate by entering passwords that are checked against a network directory, and they also can check a device's hardware and software configuration to verify it is authorized to join to network.
Company employees are notorious for making incredibly bad choices in their use of passwords, easily hacked names like "password1" and "welcome." To help protect the business network, company IT administrators set up password rules that any device joining it must follow. They also usually set the network passwords of their employees to expire periodically, forcing them to be changed, which is also intended to improve security. Finally, administrators sometimes also set up guest networks for visitors to use. Guest networks give visitors access to the Internet and some basic company information without allowing connections to critical company servers or other protected data.
Businesses utilize additional systems to improve their data security. Network backup systems regularly capture and archive critical business data from company devices and servers. Some companies require employees to set up VPN connections when using internal Wi-Fi networks, to guard against data being snooped over the air.
It has become commonplace to say that the state of cybersecurity has changed. It’s true that cybercriminals continue evolving their methods of attack. It’s not just malicious actors you have to worry about either—with the world growing more interconnected, it’s more likely than ever that insiders will accidentally cause a data breach.
To see how serious the state of cybersecurity has become, just look at some of the breaches from 2017. The Equifax® breach led to a loss of over 143 million personal records.
This happened to a company that protects private, personal data—just imagine how challenging it is for those with fewer security resources than Equifax®. And with ransomware attacks like Petya, WannaCry, and Bad Rabbit, cybercriminals no longer have to steal data records to succeed with their cyberattacks. They can simply lock up data and hold it hostage for a time to wreak havoc (and gain financial benefit).
© 2018 | All RIGHTS RESERVED | USE BY WRITTEN PERMISSION ONLY | iGuardian360™ | Omnipotent Technologies™ | Carbonizing™ | Digital Face | Catch & Release™ | ARE DESIGNATE TRADEMARKS & SERVICEMARKS of Omnipotent Technologies™