How to trick your iPhone into freeing up storage space

Posted by - July 22, 2016

Smartphones today are almost the equivalent of laptops or desktops in many ways. They have caches, cookies, and histories which take up a lot of storage space on your device. For some iPhones, they automatically clean themselves up once storage space gets too low. And for iPhone and Android phones, you can go into your… Read more »

United States Computer Emergency Readiness Team Places Strong Advisory on Symantec Products

Posted by - July 11, 2016

As per this advisory note United States Computer Emergency Readiness Team (US-CERT), a large number of products made by Symantec are affected (24 products) across multiple platforms (OSX, Windows, and Linux), and the severity of these vulnerabilities (remote code execution at root or SYSTEM privilege) make this a very serious event. A remote, unauthenticated attacker… Read more »

Think hovering your mouse over the URL will save you? Think again!

Posted by - June 22, 2016

A common anti-phishing tactic might not protect you anymore. Spammers are getting craftier with how they can capture and steal your data. Fraudsters in these particular attacks are using JavaScript to send users to a legitimate PayPal site while sending their credentials to a different domain that hosts a phishing page: “The javascript runs as… Read more »

How to go ‘Incognito’ on your web browser, and what it means

Posted by - June 06, 2016

Almost any web browser that you use will come pre-equipped with a property known as “incognito mode”, or “private browsing”. This option allows the user to hide their activities from other users on a shared computer. Why is this helpful? You can ensure your privacy when utilizing a public computer at a library, café, or… Read more »

Ka-ching! The data breach threat that targets retailers

Posted by - May 19, 2016

Large companies like Target are often the target of hackers for their immense trove of data including over 40 million consumers’ personal information. There is an obvious reason why they would be attacked on a regular basis for the sheer volume and potential value of the stolen data. But don’t be fooled into a false… Read more »

Visitors to TV station websites targeted in malvertising attack

Posted by - May 12, 2016

Two TV stations affiliated with the CBS network are experiencing malvertising attack campaigns which are targeting visitors to their websites. KMOV in St. Louis and WBTV in Charlotte, N.C. are the affected sites. Not only is it important for you as a user to ensure all of your systems are secured by implementing software patches… Read more »

Please Don’t Pay Ransoms, FBI Urges

Posted by - May 10, 2016

The Impact of Ransom Attacks We’ve shared many articles about ransomware viruses and their victims. If you think this can’t happen to your business, you may face an expensive lesson. On May 9th, 2016, a neighbor asked for help because his data was encrypted by ransomware. We’re now helping him restore his systems without paying… Read more »

How to protect your PayPal account with two-step verification (2SV)

Posted by - May 09, 2016

We have previously featured two-step verification for your Google and Yahoo! accounts. In this new article we are providing step-by-step instructions on how to apply this security feature to your PayPal account as well. This, more so than the other two, might be even more important as it usually directly links to your credit card… Read more »