Recently, reports have been circulating the internet of phishing attempts that mimic Google Docs authentication emails to gain access to user’s computers. The offending emails will appear to be from someone on your contacts list and will contain what appears to be a link to a Google Doc. When you click on this link, you…
Microsoft has begun to phase out Windows 7 and 8 by prioritizing hardware compatibility for Windows 10 updates. What does that mean? Well, the short version is that some newer processors, such as 7th gen Intel Cores, AMD Ryzen, and Qualcomm 8996 or later, the newest Windows 7 and 8 security updates will not install….
In today’s blog post we will be discussing MacOS and some useful tricks to keeping up productivity using this operating system. The following tips are written with the most recent MacOS version in mind, MacOS Sierra. Most of these tips should still work with older versions, but keep your OS version in mind as you…
In this week’s tips and tricks guide, we will be focusing on the iphone and iOS devices. We will be primarily focusing on iOS 10 for this guide, which comes on any new iOS device purchased within the last year or so. If you aren’t sure what version of iOS you have, you can check…
In this week’s tips and tricks guide, we will be focusing on Android Smartphones. We will be focusing on different types of smartphones in separate blog posts, as each one has it’s own ins and outs to experiment with. Androids, in particular, are useful for users that like to use gmail and other google services…
Welcome to the first in our Tips and Tricks series of blogs. In this series, we will be highlighting useful things to know about every day computer and electronic use. Some of this information may seem obvious to some readers and completely new for others. It is our hope that these blogs can be used…
Earlier this month, a security bug has leaked usernames and passwords from roughly 3,400 websites, including popular services like Uber, Fitbit, OkCupid, and 1Password. The bug, now being referred to as “CloudBleed”, is found in cybersecurity company Cloudflare’s security suite. It would essentially vomit user information, potentially including usernames, passwords, private messages, chat messages, and…
For those of you that do not know, Microsoft regularly releases security updates for it’s security programs and operating systems, typically once a month, in order to keep ahead of potential hackers and scammers. February’s updates, however, have been shelved at the last minute by Microsoft, which stated that the updates will instead be released…
More phone phishing attempts A troubling trend has been sweeping the internet and IT security spheres. Sources estimate an increase of as much as 250% in 2016, following an information leak by Dell and several other technology leaders, scammers have been calling customers’ phones claiming to be from Tech Support and requesting that customers give…
The confirmation from Yahoo about the hack on August 1st, exposing information for 200 Million users is yet another example of that Wild-Wild-West we call the Internet. Everyone needs to be proactive in safeguarding banking and personal information as well as updating account passwords. These hacks may result in identity theft, credit card fraud, or…