So much of cybersecurity depends on adequate awareness from users. Phishing for example, preys on people’s fears and desires to convince them to click on hyperlink images and text before checking where they actually lead to. However, with the latest trend in phishing, even the most cautious users can get swept up. Read on to […]
Homographs: the newest trend in phishing
New Mac Pro: latest rumors
For years, Apple users have been holding on to nothing but online rumors concerning the release date of the new Mac Pro. Thankfully, Apple just confirmed a radical revamp of its high-end workstation. Although official information on the different models’ specs and features have not been confirmed, hints have been made about what could be […]
Back up your mobile devices now
Mobile phones’ sizes and styles went through massive changes in the last few years. And as their looks and dimensions changed, so did their functions. With better capacity and bigger storage, mobile phones turned into veritable mini-computers that businesses were quick to adopt as a vital office tool. Naturally, hackers got the memo. With new […]
Are you using this WordPress checklist yet?
Many would initially blame hackers for an extremely slow website or being delisted from search engines, but that’s not always the case. When it comes to managing your website, how sure are you that all your bases are covered? If you are unsure, you might want to give this WordPress maintenance checklist a try. Make […]
When did you last update your firmware?
Most IT consultants constantly remind clients of how important it is to update and patch their software, but neglect the importance of updating hardware. We don’t mean replacing it with new hardware; we mean updating the applications and settings coded into the physical IT powering every modern office. What is firmware? Firmware is a very […]
Roundup of G Suite feature updates
Like most software developers, Google releases enhancements for G Suite every month. These upgrades are often small changes that go unnoticed, but if you stay up-to-date with Google developments you just might find a new feature that could completely revamp how you do business. If you’re a G Suite user, utilizing these 2017 updates could […]
Move Android data to a new phone in minutes
Getting a new Android phone is an exciting affair. There are new hardware specs, feature upgrades, and fresh apps, but if you can’t migrate the data from your old phone, it’s all for naught. Thankfully, Google’s operating system makes it incredibly simple. There are three ways to go about it and we cover each in […]
How to Stop the New Microsoft Word 0-Day Exploit in Its Tracks
The hot topic hitting the tech news cycle this week has been the malware called CVE-2017-0199, a zero-day security vulnerability disguised as a Microsoft Word attachment. This bug is particularly dangerous because you don’t need to enable macros for it to activate.
Hands-on virtualization with a 1990s Mac
Even if virtualization has been explained to you before, it’s entirely possible that the definition didn’t stick. There are so many variations of this technology that we take it upon ourselves to periodically review its most basic functions. And because these variations aren’t concrete enough to easily understand them, this time we’re including a virtualized […]
Fake Skype ads lead to ransomware attacks
Hackers have used Skype to conduct various phone scams; but this month, they have found a new way to exploit the popular video calling app. Ransomware, which has predominantly been distributed via email attachments and URL links, is now being delivered through fake Skype ads. The details below will help you avoid business-crippling ransomware. Initial […]
