If you use Microsoft OneDrive, it’s time to review your usage rate, and perhaps start thinking of switching to a different cloud-based storage...
Read MoreRecent Posts
Be Careful: Fake Apps Are Stealing Information
Security researchers at the firm ESET have recently warned of a total of 8 apps found on the Google Play store. These apps, at first glance, appear...
- Blog
- General Interest
- Malware and Virus Protection
- Security
- Technology
- Technology News
- Technology Tips
New iPhone Attack Seems Very Familiar: Watch Out For MMS
Last July, Android users got a nasty surprise. The surprise came in the form of a new type of attack directed against smartphones. Dubbed...
Read MoreWould Your Company Fail A Web Security Test?
How solid is your firm’s web security? According to recent findings by the penetration expert Ilia Kolochenko, probably not very good. Kolochenko...
Read MoreWill Your Next Hard Drive Be MRAM?
There’s a new technology in the area of memory and storage. MRAM. If you haven’t heard of it, you’re not alone, but it’s one of two promising up and...
Read MoreNeed More Laptop Drive Space? How About A 4TB SSD?
Samsung made a surprising new product offering with little fanfare. There was so little fanfare, in fact, that you may have missed it. The company is...
Read MoreWill Printers Serve Up Your Next Computer Infection?
Vectra Networks has found an old, longstanding vulnerability in Windows, and it comes from a rather unexpected source. Printers. Way back in 2007, an...
- Blog
- Malware and Virus Protection
- Microsoft
- Recent News
- Security
- Technology
- Technology News
- Technology Tips
- Windows
By now, the headlines will scarcely surprise anyone. Yet another business has suffered a major data breach. This time, it was Omni Hotels, a luxury...
Read MoreThieves Are Using Technology To Hack In And Steal Cars
The world’s hackers are branching out. No longer content to simply breach the digital fortresses that today’s businesses and governments have become,...
Read MoreMac Is The Focus of New Malware
In the old days, before the rise of the iPad and iPhone, hackers were mostly content to leave Apple alone. They had such a tiny slice of the computer...
Read More
