If you have an Apple computer, this is an urgent security update! A security flaw has been found in apple operating systems that could allow someone with physical access to your computer to bypass any security procedures you have in place, such as passwords and secondary login software. Luckily, Apple has already plugged this…
Microsoft has begun to phase out Windows 7 and 8 by prioritizing hardware compatibility for Windows 10 updates. What does that mean? Well, the short version is that some newer processors, such as 7th gen Intel Cores, AMD Ryzen, and Qualcomm 8996 or later, the newest Windows 7 and 8 security updates will not install….
Recently, reports have been circulating the internet of phishing attempts that mimic Google Docs authentication emails to gain access to user’s computers. The offending emails will appear to be from someone on your contacts list and will contain what appears to be a link to a Google Doc. When you click on this link, you…
Microsoft has begun to phase out Windows 7 and 8 by prioritizing hardware compatibility for Windows 10 updates. What does that mean? Well, the short version is that some newer processors, such as 7th gen Intel Cores, AMD Ryzen, and Qualcomm 8996 or later, the newest Windows 7 and 8 security updates will not install….
Earlier this month, a security bug has leaked usernames and passwords from roughly 3,400 websites, including popular services like Uber, Fitbit, OkCupid, and 1Password. The bug, now being referred to as “CloudBleed”, is found in cybersecurity company Cloudflare’s security suite. It would essentially vomit user information, potentially including usernames, passwords, private messages, chat messages, and…
For those of you that do not know, Microsoft regularly releases security updates for it’s security programs and operating systems, typically once a month, in order to keep ahead of potential hackers and scammers. February’s updates, however, have been shelved at the last minute by Microsoft, which stated that the updates will instead be released…
More phone phishing attempts A troubling trend has been sweeping the internet and IT security spheres. Sources estimate an increase of as much as 250% in 2016, following an information leak by Dell and several other technology leaders, scammers have been calling customers’ phones claiming to be from Tech Support and requesting that customers give…
The confirmation from Yahoo about the hack on August 1st, exposing information for 200 Million users is yet another example of that Wild-Wild-West we call the Internet. Everyone needs to be proactive in safeguarding banking and personal information as well as updating account passwords. These hacks may result in identity theft, credit card fraud, or…
As we all know, the internet can be a wild, and usually not the safest, place. We use things like passwords and antivirus software to protect ourselves, but these are not simply push-and-forget methods. It is important to understand how and why these systems work, and how to make ours work even better. So, here…
For those of you who don’t know, the term “Phishing” describes a common activity by scammers and hackers on the internet. Essentially, the scammer tries to trick you into giving him your login or other confidential information by sending you an email requesting it that looks like it came from a reputable source. For example:…