BLOG
Have you heard of Hot Potato? It’s the latest security exploit that Windows-based machines are vulnerable to. Note that this doesn’t target a particular version of Windows, but rather, spans...
Ransomware is shaping up to be the most significant threat from the hacker community in 2016. Over the last few days, Locky, a new piece of malware has been spreading like a wildfire across the...
Do you own a Surface Pro, Surface Pro 2, or Surface Pro 3? If so, and if you made your purchase before March, 2015, you should know that Microsoft has just issued a recall for the AC power cords for...
A health insurer based in St. Louis, called Centene, has “misplaced” six hard drives. Normally that would not be a big deal, but these particular hard drives happened to contain the personal data of...
Since 2011, a company called SplashDash has posted a “Worst Password List” based on data mined from hacks and data breaches. What’s remarkable about the annual list is how little it changes from one...
For many months, Amazon has been planning to take the retail game to the next level. Their ambitious plan first became visible with the inclusion of mysterious “Dash Buttons” on various classes of...
As almost everyone is aware, Email was the first “killer app.” It very quickly went from being an expensive, idle curiosity, where users had to buy digital stamps in order to send each and every...
As the economy continues to improve, and labor gets tighter, wages start to rise. It’s inevitable, and that reality sends shock waves of fear through the small business community. After all, they...
Back in September, not long after Apple started selling the iPhone 6S and 6S Plus, users began complaining of a strange problem with their batteries. You may have experienced this yourself. One...