How Changes to the Microsoft Donation Program will Affect You

Posted by - March 17, 2022

If you’re like many non-profits, you may benefit from the Microsoft Non-profit program. This endeavor has enabled nearly 400,000 organizations worldwide to access top-notch technology at discounted rates.  However, there are going to be some major changes to the software donation program that will take place on April 4, 2022 that you should be aware… Read more »

Are you being tracked by an Apple AirTag?

Posted by - March 04, 2022

Apple’s AirTag devices have risen in popularity since their release in 2021. Though their aim is to help users track items such as their keys or bags by attaching an AirTag to them, some have found more nefarious uses for these tracking devices. There have been reported cases of AirTags being slipped into someone’s bag… Read more »

Cyberattacks on US Infrastructure likely to Increase Amidst Russia Sanctions

Posted by - February 28, 2022

Cybersecurity experts and the FBI are warning Americans that there will likely be an increase in cybersecurity attacks targeting U.S. citizens and companies. This warning follows a slew of sanctions Western nations have placed on Russia following its invasion of and malware attacks against Ukraine. Tensions have further escalated since the U.S. and allies blocked… Read more »

How to Play Wordle for Free after it’s Behind a Paywall

Posted by - February 24, 2022

If you’re like millions of other Americans, you’ve probably heard of, if not already played, Wordle. This addictively simple word game has boomed in popularity due to its virality, ad-free nature, and lack of a price tag. Unfortunately, this may change soon. In late January, it was announced that the New York Times bought Wordle…. Read more »

Is Zoom Sharing your Data?

Posted by - January 25, 2022

In recent years, Zoom has become one of the most popular video conferencing platforms in the world, boasting over 300 million daily meeting participants- largely due to the sharp increase in remote working trends. Though many people find its interface user-friendly and convenient, it certainly comes with a host of privacy risks. Privacy experts have… Read more »

Here’s Why you Should Clear your Android’s Cached Data

Posted by - January 24, 2022

Though cookies and cached data within your mobile phone browser can improve your browsing experience by keeping you logged into websites and saving website preferences, they can also become burdensome. Cookies are used by websites to track your browsing history so that they can more easily serve you with personalized ads- which can be an… Read more »

Files in Microsoft may not be as safe as they appear

Posted by - January 10, 2022

ZLoader is a popular malware among hackers, and has recently been used to steal user credentials and other sensitive information by exploiting a vulnerability in Microsoft’s digital signature verification. So how does this affect you?  Microsoft’s signature verification tool Authenticode is used to ensure that a file is legitimate and trustworthy. Researchers at Check Point… Read more »

The VA General Assembly was Attacked- What Happens Now?

Posted by - December 27, 2021

On December 12th, the Virginia General Assembly was hit by a ransomware attack. Specifically, the Legislative Automated Systems branch was attacked by currently unnamed threat actors. This department essentially acts as the information technology arm of the state legislature, dealing with affairs involving publication production and distribution, computer technology information, and legislative information collection and… Read more »

The Log4j Bug is of the Most Serious Threats in Recent Years

Posted by - December 20, 2021

As you may have seen on the news, on December 9th, 2021, a zero-day exploit was observed targeting Log4j, a ubiquitous open-source logging tool. In short, Log4J is a logging tool for programs to track any errors that may occur within an application. The bug (known as Log4Shell) has affected thousands of various systems across the… Read more »