blog

BLOG

Microsoft Word Vulnerability Being Used To Victimize Email Users

Microsoft is taking some heat, thanks to a nasty exploit in Microsoft Word that is being used to install malware on the PCs of unsuspecting users. The exploit was discovered by both McAfee and...

GameStop Latest To Have Customer Information Hacked

If you shop at GameStop.com, keep an eye on the credit card you used for signs of suspicious activity. According to security researcher Brian Krebs, sources inside the financial industry are reporting...

Dallas Storm Siren Hack May Signal Future Bigger Infrastructure Hacks

The city of Dallas, Texas is under siege by hackers. Not long ago, an unknown hacker took control of several of the city’s signal lights. Even more recently, another hacker commandeered all 156 of the...

Some Illegal Movie Downloads May Contain Trojan Threat

If you use torrent software to download advance copies of movies or your favorite TV shows, your machine could be part of a large and sprawling botnet called Sathurbot. The hackers behind the botnet...

Use This 9-Step Checklist To Ensure Your Data Is Safe, Secure And Recoverable

Summer is upon us Time for a stroll in the park…softball…fishing…a few rounds of golf Yet how could you possibly relax if some random bit of malware, software glitch or cyber-attack...

New Bill May Help Small Businesses With CyberSecurity Guidance

If you’re a small business owner, you may feel completely overwhelmed by the digital security threats you face, and you’re not alone. A recent survey indicated that more than 70% of all cyber-attacks...

Buy Computer Hardware Now: Prices Expected To Increase This Year

If you’re in the market for new hardware, PC or smartphone, now is the time to buy. All indications are that prices are going to be rising in the next year. There are a few different factors in play...

Watch Your Blog Comments, Or Risk Getting Flagged

If you participate in blog conversations, then you’ve probably heard of Disqus. It’s the largest and most well-known blog commenting software on the web today, used by a variety of news media sites...

Telephone Scammers Get Tricky By Recording “Yes,” Using It Against You

What’s old is new again. In the days before the internet, scammers frequently weaponized the telephone, but now, that’s considered old school. While telephone scams still exist, they’re not nearly as...