Our Blog

Google adds phishing defenses for Android

Google adds phishing defenses for Android

Although hackers are known for unleashing a host of malware to infiltrate critical networks and devices, phishing emails are their most effective attack method. This scam preys on the trust of computer users with seemingly innocuous emails that request for login credentials or prompt a file download.

NSA tools behind worldwide WanaCry ransomware attack

NSA tools behind worldwide WanaCry ransomware attack

Early analysis has found that the attackers dropped WanaCryptOr 2.0 ransomware using an exploit tool released last month by the Shadow Brokers hacking group. Also known as Wannacry, the malware is displaying a ransom note demanding $300 in Bitcoin that must be paid within three days. The most widely hit countries so far are the Russian Federation, Ukraine, India and Taiwan, according to Kaspersky Labs. About 60,000 computers in total are infected.

Windows 10 updates will be biannual

Windows 10 updates will be biannual

Updating the Windows operating system is both crucial for the security of your computers, and incredibly frustrating. Up until now, Microsoft has released patches and updates unpredictably and often at a pace difficult to maintain. However, the company behind the world’s more popular operating system has announced it’s making some changes.

Use This 9-Step Checklist To Ensure Your Data Is Safe, Secure And Recoverable

Use This 9-Step Checklist To Ensure Your Data Is Safe, Secure And Recoverable

Yet how could you possibly relax if some random bit of malware, software glitch or cyber-attack catches you off guard just as you’re walking out the door? A well-designed secure computer network gives you the confidence that “all systems are go,” whether you’re having fun in the sun, or just getting things done with your team.

This fake Google app is really a phishing scam

This fake Google app is really a phishing scam

If employee training and education isn’t an integral part of your cybersecurity strategy, a recent scam might force you to reconsider. Instead of relying on complicated programming code to steal and destroy data, hackers are increasingly relying on human errors to get the job done.

Beware: new Mac malware on the loose

Beware: new Mac malware on the loose

One of the defining characteristics of Apple computers is their seemingly impenetrable security system. Business and individual consumers alike who value security most in an operating system choose Apple products. Will this still be the case now that malware attacks on MacOS are increasing — 744% in 2016, according to reports? Read on to find out.

The true cost of an ugly website

The true cost of an ugly website

We are taught never to judge a book by its cover. But in this superficial age, looks are everything, especially for websites. Your website is a customer’s first impression of your business, and if your site has poor graphics, illegible content, and other website no-no’s, that could end all chances of establishing a relationship and driving revenue.

You can now scan documents on Android

You can now scan documents on Android

Good news for Android users of Dropbox apps. Last month, Dropbox announced a new app update that will bring the very useful document scanning feature to Google’s operating system. This means you no longer have to use a bulky scanner to convert files into PDFs — just bring your Android device.

Windows 10 Creators Update: new features

Windows 10 Creators Update: new features

Instead of an outright operating system update, Microsoft is now releasing named updates that come with enhancements and other features that individual users and businesses should get excited about. Its latest, Creators Update on Windows 10, includes new design touches and a handful of productivity features.

Sly phishing attack catching users off guard

Sly phishing attack catching users off guard

You pay close enough attention to the links you click to avoid clicking on something like goolge.com or evrenote.com…right? Because if you’re not, you could end up exposing your computer or smartphone to a host of malware. The newest phishing attack strategy is the worst of all, and can catch even the most astute users off guard.