Alert: Acer Breach Compromised Customer Credit Cards

Posted by - August 08, 2016

If you’re an Acer online store user, double check your credit card info and ensure no fraudulent purchases were made. If your information was lifted, you hopefully would have been contacted by Acer as the hack occurred between May 2015 and April of this year. The assumed nature of the breach is perhaps due to… Read more »

KeySniffer Follows the Scent of Cheap Wireless Keyboards

Posted by - August 03, 2016

Do you utilize a wireless keyboard at work or home? Do you type in passwords, credit card information, security answers, or other personal data? Possibly up to two thirds of all lower cost wireless keyboards are prone to hacker attacks. With “KeySniffer”, these hackers can have access to all data that is typed using the… Read more »

200 million Yahoo passwords being sold on the dark web?

Posted by - August 03, 2016

Are you a Yahoo user or someone that once had an account and is also utilizing the same password for other websites? You may want to think about changing your password. A cybercriminal is advertising 200 million alleged Yahoo user credentials on the dark web. Yahoo says its aware of the claim, but has not… Read more »

Microsoft Sets Itself Up Nicely with Windows Store Loophole

Posted by - August 02, 2016

All companies want to get the best out of their employees, which means efficiency at work and cutting back on options to lead employees to stray, such as apps and games on their computers. At the same time, all companies want higher profits and revenue, which for some companies, means luring these employees to buy… Read more »

How to trick your iPhone into freeing up storage space

Posted by - July 22, 2016

Smartphones today are almost the equivalent of laptops or desktops in many ways. They have caches, cookies, and histories which take up a lot of storage space on your device. For some iPhones, they automatically clean themselves up once storage space gets too low. And for iPhone and Android phones, you can go into your… Read more »

United States Computer Emergency Readiness Team Places Strong Advisory on Symantec Products

Posted by - July 11, 2016

As per this advisory note United States Computer Emergency Readiness Team (US-CERT), a large number of products made by Symantec are affected (24 products) across multiple platforms (OSX, Windows, and Linux), and the severity of these vulnerabilities (remote code execution at root or SYSTEM privilege) make this a very serious event. A remote, unauthenticated attacker… Read more »

Think hovering your mouse over the URL will save you? Think again!

Posted by - June 22, 2016

A common anti-phishing tactic might not protect you anymore. Spammers are getting craftier with how they can capture and steal your data. Fraudsters in these particular attacks are using JavaScript to send users to a legitimate PayPal site while sending their credentials to a different domain that hosts a phishing page: “The javascript runs as… Read more »

How to go ‘Incognito’ on your web browser, and what it means

Posted by - June 06, 2016

Almost any web browser that you use will come pre-equipped with a property known as “incognito mode”, or “private browsing”. This option allows the user to hide their activities from other users on a shared computer. Why is this helpful? You can ensure your privacy when utilizing a public computer at a library, café, or… Read more »