As the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own. If used effectively, hackers can […]
When most people think of the iPhone, an Excel spreadsheet isn’t exactly the first thing that springs to mind. Whether it was the smartphone’s form factor or a general aversion to working from a mobile device, most of us had no reason to search out iOS versions of Microsoft’s legendary productivity software. Nowadays, screens have […]
In the Trojan War, a wooden horse wheeled into the city of Troy. Once night fell, the Greek army crept out of the hollow stallion and opened the city’s gates. Having breached the mighty fortress, the entire regiment eventually sealed their victory against the Trojans and won the war. The moral of the story is […]
Microsoft’s Office 365 platform isn’t one of the most popular productivity suites in the world by luck. The company’s expertise in creating functional, innovative and easy-to-use business applications has won over thousands of users for decades even before the cloud. And today, Microsoft strives to remain ahead of the competition by rolling out new upgrades […]
As various aspects of our lives move into the cloud — from photos to what’s in our refrigerator — there’s an ever-increasing number of vendors to choose from. Founded in 2007, Dropbox was one of the earliest companies to popularize the term ‘cloud storage’ and since then they’ve mostly focused on perfecting that business model. […]
Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for […]
Forgot your password? We’ve all been there. There’s nothing more frustrating than getting locked out of your E-mail, Facebook, or worse, your entire computer! Or, how about logging into your account, only to realize someone has hacked into your page and posted embarrassing content to your entire network. Not. Cool. Lucky for you, our computer […]
Confusion about computer viruses is almost as prevalent as the viruses themselves. With this in mind, here are some common myths about computer viruses that need to be debunked once and for all. Myth: Smartphones can’t get viruses. Mobile devices are just as vulnerable to viruses as personal computers when left unprotected. Threats can come […]
Technology can be fickle at times. When it’s not working properly, it can hold your business back from reaching its maximum potential. Therefore, in order to maximize your bottom line, it becomes common sense to ensure that your technology is in proper working order at all times. The problem lies in the fact that you […]
You might recall getting a notice from your bank that you’ve been issued a new debit and credit card, one with a chip built into it for enhanced security. There are ATMs out there created specifically for use with these chips, but the same technology created to protect user credentials is now being used to […]