For all those who have been told Apple’s devices don’t suffer the security issues that Microsoft devices do this article may come as a shock. For those who know that Apple devices are frequently the first operating system hacked at hacker’s conventions you won’t be surprised at all. Ransomware, executed via Apple iCloud’s “Find my…
Read more
May 2014 isn’t quite over, but it’s been another busy month for cyber crime. Aside from the ongoing attacks against digital currency some of the attacks have changed focus, with more of a focus on law enforcement, the defense industry and technology service providers. Below is a list of just some of the attacks that…
Read more
Although this one is funny as it gives you instructions to get infected… The question is how many people will follow these instructions and get infected… Remember the rule for .ZIP files is if you don’t know who it’s from, or aren’t expecting it, DON’T OPEN IT!!! If you think it might be legitimate, but…
Read more
A lot of the new Top Level Domains (TLDs) are a lot of fun and making great additions to business. .BOUTIQUE is great for local markets – Savvy.Boutique, or LulusChic.Boutique are another great way to brand local boutiques. We’re fans of .TECHNOLOGY and .COMPUTER and have purchased both for our business. .TATTOO, there is no…
Read more
The term Malware is thrown around a lot. If you’ve found your computer infected and had a repair done or just brought your computer in for a clean-up, you’ve likely been told the technician removed malware infections, but what does that really mean? There are quite a few types of Malware infections, but to give…
Read more