This is a fascinating article on artificial intelligence, where its been and where its going, and how we got there; but moreover, have you thought about how AI may affect your business years down the road? Are you prepared for the changes and challenges that such technology might present? The article talks about three waves… Read more »
Blog
Employees in the dark about data retention policy
As a company or organization, you have a legal requirement to retain information and communication. Studies show that most employees have no idea what these policies are, and chances are, neither do you. Read the full article to see what the actual statistics are. These policies should not only include what to retain and for… Read more »
The Art of the Pitch
Do you have your elevator pitch ready? You know, those 90 second speeches you have prepared to give at networking events and run-ins with colleagues. Did you know, even if you haven’t given one professionally, you’ve probably already given them when trying to explain to your family and friends what you do for a living? … Read more »
Why it’s a good idea to clear your browser history and cookies
A website cookie is a file that helps websites identify who you are and whether you have been to a website before. This is useful for remembering your preferences or items you may have ordered, making your website experience a better one. The problem occurs when hackers can manipulate this data, as evidenced in this… Read more »
Encryption is a good thing
Recently, a terrorist used WhatsApp to send and receive encrypted messages to help plan an attack, and there have been demands by some that there should be a weakening or banning of this type of encryption. Would this help prevent this type of terrorist communication? Absolutely not. Some have also called for backdoor systems to… Read more »
Movie night? Nope. It’s a fake iTunes receipt from phishers targeting Apple users
There is a new phish in town, and now its targeting iTunes users trying to access their personal information. This attack is emailed in the form of a receipt which appears to come from your iTunes account listing movies the victim supposedly purchased. There is a link at the bottom which, when clicked, directs the victim to a… Read more »
100,000+ WordPress webpages defaced as recently patched vulnerability is exploited
WordPress recently released a new version of their software which also included an update that fixed a previously undisclosed critical vulnerability. If left unpatched, hackers could possibly modify the content of any post or page on a WordPress website. Initially this vulnerability was not made public in the hopes of staving off hackers; however, it… Read more »
Is Public Wi-Fi Safe?
How to Stay Safe on Public Wi-Fi: Protecting Your Personal Data Have you ever stopped to think about the safety of the free Wi-Fi network you’re connecting to at your local coffee shop? If you’re like most people, you probably haven’t. But here’s something you might not know—scammers often set up fake Wi-Fi hotspots to… Read more »
Police request Echo recordings for homicide investigation
Arkansas police are hoping they can use an Echo found at a murder scene, and its recordings, to help with the investigation of a murder. Echoes only begin recording after hearing the wake word, but background noise/chatter could have activated the device. Amazon stores all the voice recordings from its devices on its servers. As… Read more »
Yahoo’s billion account database for sale on the black market
Those one billion Yahoo! users’ account information, which was stolen back in 2013, is now for sale on the computer underground market for a total of a little less than one million dollars. So not only is the data currently in the hands of criminals and probably being utilized, but if you have not changed… Read more »