A two-year investigation has led to the arrest of two telephone scammers who were preying on vulnerable victims, tricking them into thinking their electronic devices were affected by malware. This investigation was conducted by Microsoft and British police. One of the ways the scammers tricked their victims into believing their PCs had been infected was… Read more »
Blog
Malware’s Flames Infect a Quarter of a Billion Computers
Just when you thought you were safe from WannaCry, a new bully is on the playground called Fireball. And this malware has already infected over a quarter billion computers worldwide! One of out every five corporate networks have been compromised. Most of these are in other countries as the US, thankfully for now, only accounts… Read more »
Your passwords may soon get a lot longer, but they’ll be much easier to remember
With new guidelines from the US National Institute of Standards and Technology, we will soon, hopefully, see the elimination of older, outdated standards such as frequent password changes and utilizing special characters. These guidelines will affect both government and business passwords. Because humans have limited memory capabilities, having to recall long, complicated strings of characters… Read more »
After hackers fail to extort money, new Pirates of the Caribbean movie torrents appear
Even a company as large as Disney has fallen victim to hackers, having had files of their recent movie stolen and threatened to be released online if ransoms were not paid. They refused, and clips have since surfaced. Its great news that they refused to pay and instead worked with authorities to try and bring… Read more »
Deleting your cookies, cache, and browser history in Microsoft Edge
Previously, we have shown you how to delete and clear these pesky, residual elements in Internet Explorer that stick around on your computer after you’re finished searching the web. This time, we will be showing you how to do it for Microsoft Edge, their newest web browser. You’ll find updating to this browser comes… Read more »
Protect Against WannaCry: Microsoft Issues Patch for Unsupported Windows (XP, Vista, 8,…)
The largest ransomware attack in history has already infected over 114,000 Windows systems worldwide. Many of these infections were on older, unsupported versions of Windows such as XP, Vista, and Windows 8. There is a reason any IT professional will advise you to upgrade to any current OS; these systems are constantly supported and updated… Read more »
The phishing swindle that conned $100 million out of Google and Facebook
Recently, both Google and Facebook were victims of fraud in which the criminal managed to convincingly impersonate an Asian manufacturer, generate fraudulent emails from the company, and invoice those huge companies for millions of dollars. This was done by simply forging invoices, contracts, and letters from the victim companies. Luckily, Google and Facebook are large… Read more »
Beware bogus emails from LinkedIn asking for your CV!
As in every case involving your personal information, you should be wary of giving it out to strangers, especially when being solicited. The newest scammer craze is being targeted through LinkedIn by a spammer emailing contacts letting them know they are urgently seeking workers. These emails inform the person that they match qualifications they are… Read more »
Artificial Intelligence Tech Will Arrive in Three Waves
This is a fascinating article on artificial intelligence, where its been and where its going, and how we got there; but moreover, have you thought about how AI may affect your business years down the road? Are you prepared for the changes and challenges that such technology might present? The article talks about three waves… Read more »
Employees in the dark about data retention policy
As a company or organization, you have a legal requirement to retain information and communication. Studies show that most employees have no idea what these policies are, and chances are, neither do you. Read the full article to see what the actual statistics are. These policies should not only include what to retain and for… Read more »