Smartphones today are almost the equivalent of laptops or desktops in many ways. They have caches, cookies, and histories which take up a lot of storage space on your device. For some iPhones, they automatically clean themselves up once storage space gets too low. And for iPhone and Android phones, you can go into your… Read more »
Blog
United States Computer Emergency Readiness Team Places Strong Advisory on Symantec Products
As per this advisory note United States Computer Emergency Readiness Team (US-CERT), a large number of products made by Symantec are affected (24 products) across multiple platforms (OSX, Windows, and Linux), and the severity of these vulnerabilities (remote code execution at root or SYSTEM privilege) make this a very serious event. A remote, unauthenticated attacker… Read more »
Mark Zuckerberg Covers His Laptop Camera. You Should Consider It, Too.
When the leader of the social media universe and the director of the FBI both do something, perhaps you should too. Covering the camera and microphone on your laptop with tape is a very simple way of preventing a hacker from having insight into your personal life. Think this can’t happen to you? The report… Read more »
Think hovering your mouse over the URL will save you? Think again!
A common anti-phishing tactic might not protect you anymore. Spammers are getting craftier with how they can capture and steal your data. Fraudsters in these particular attacks are using JavaScript to send users to a legitimate PayPal site while sending their credentials to a different domain that hosts a phishing page: “The javascript runs as… Read more »
How to go ‘Incognito’ on your web browser, and what it means
Almost any web browser that you use will come pre-equipped with a property known as “incognito mode”, or “private browsing”. This option allows the user to hide their activities from other users on a shared computer. Why is this helpful? You can ensure your privacy when utilizing a public computer at a library, café, or… Read more »
Repairing Your Old Phone System Could Be Costing You Money
Just like owning a car that may be a bit old and worn down, we understand the complexities of a phone system in your office. Do you keep spending money on parts, replacements, fixes, and touch-ups or do you just bite the bullet and buy a new one? For many of us, when it comes… Read more »
Ka-ching! The data breach threat that targets retailers
Large companies like Target are often the target of hackers for their immense trove of data including over 40 million consumers’ personal information. There is an obvious reason why they would be attacked on a regular basis for the sheer volume and potential value of the stolen data. But don’t be fooled into a false… Read more »
Visitors to TV station websites targeted in malvertising attack
Two TV stations affiliated with the CBS network are experiencing malvertising attack campaigns which are targeting visitors to their websites. KMOV in St. Louis and WBTV in Charlotte, N.C. are the affected sites. Not only is it important for you as a user to ensure all of your systems are secured by implementing software patches… Read more »
Please Don’t Pay Ransoms, FBI Urges
The Impact of Ransom Attacks We’ve shared many articles about ransomware viruses and their victims. If you think this can’t happen to your business, you may face an expensive lesson. On May 9th, 2016, a neighbor asked for help because his data was encrypted by ransomware. We’re now helping him restore his systems without paying… Read more »
How to protect your PayPal account with two-step verification (2SV)
We have previously featured two-step verification for your Google and Yahoo! accounts. In this new article we are providing step-by-step instructions on how to apply this security feature to your PayPal account as well. This, more so than the other two, might be even more important as it usually directly links to your credit card… Read more »