If you’re an Acer online store user, double check your credit card info and ensure no fraudulent purchases were made. If your information was lifted, you hopefully would have been contacted by Acer as the hack occurred between May 2015 and April of this year. The assumed nature of the breach is perhaps due to… Read more »
Blog
KeySniffer Follows the Scent of Cheap Wireless Keyboards
Do you utilize a wireless keyboard at work or home? Do you type in passwords, credit card information, security answers, or other personal data? Possibly up to two thirds of all lower cost wireless keyboards are prone to hacker attacks. With “KeySniffer”, these hackers can have access to all data that is typed using the… Read more »
200 million Yahoo passwords being sold on the dark web?
Are you a Yahoo user or someone that once had an account and is also utilizing the same password for other websites? You may want to think about changing your password. A cybercriminal is advertising 200 million alleged Yahoo user credentials on the dark web. Yahoo says its aware of the claim, but has not… Read more »
Microsoft Sets Itself Up Nicely with Windows Store Loophole
All companies want to get the best out of their employees, which means efficiency at work and cutting back on options to lead employees to stray, such as apps and games on their computers. At the same time, all companies want higher profits and revenue, which for some companies, means luring these employees to buy… Read more »
How to trick your iPhone into freeing up storage space
Smartphones today are almost the equivalent of laptops or desktops in many ways. They have caches, cookies, and histories which take up a lot of storage space on your device. For some iPhones, they automatically clean themselves up once storage space gets too low. And for iPhone and Android phones, you can go into your… Read more »
United States Computer Emergency Readiness Team Places Strong Advisory on Symantec Products
As per this advisory note United States Computer Emergency Readiness Team (US-CERT), a large number of products made by Symantec are affected (24 products) across multiple platforms (OSX, Windows, and Linux), and the severity of these vulnerabilities (remote code execution at root or SYSTEM privilege) make this a very serious event. A remote, unauthenticated attacker… Read more »
Mark Zuckerberg Covers His Laptop Camera. You Should Consider It, Too.
When the leader of the social media universe and the director of the FBI both do something, perhaps you should too. Covering the camera and microphone on your laptop with tape is a very simple way of preventing a hacker from having insight into your personal life. Think this can’t happen to you? The report… Read more »
Think hovering your mouse over the URL will save you? Think again!
A common anti-phishing tactic might not protect you anymore. Spammers are getting craftier with how they can capture and steal your data. Fraudsters in these particular attacks are using JavaScript to send users to a legitimate PayPal site while sending their credentials to a different domain that hosts a phishing page: “The javascript runs as… Read more »
How to go ‘Incognito’ on your web browser, and what it means
Almost any web browser that you use will come pre-equipped with a property known as “incognito mode”, or “private browsing”. This option allows the user to hide their activities from other users on a shared computer. Why is this helpful? You can ensure your privacy when utilizing a public computer at a library, café, or… Read more »
Repairing Your Old Phone System Could Be Costing You Money
Just like owning a car that may be a bit old and worn down, we understand the complexities of a phone system in your office. Do you keep spending money on parts, replacements, fixes, and touch-ups or do you just bite the bullet and buy a new one? For many of us, when it comes… Read more »