BLOG
A great many malware strains are designed to engage quietly during a PC’s startup process and then idle in the background. They are in the system logging keystrokes, taking screen shots at...
If you haven’t yet installed the latest Windows 10 or Windows Server update, here’s something to be aware of before you do. You may not be able to update or install some third-party...
Skynet just took a step closer to becoming a reality. The word, of course, refers back to the hit movie, ‘Terminator,’ in which a computer network gained sentience and decided to do away...
Intel has had more than its share of challenges over the last couple of years. Not the least of which included a whole family of new attack vectors that made headlines and caused panic around the...
Selling network access is big business on underground hacking websites. Even worse, the business is growing at an alarming rate, according to a report recently published by cyber security firm KELA...
Since Google introduced Google Analytics back in 2005, it has become the industry standard. A simple, free method of getting a bird’s eye view into who’s searching for what on the...
The year 2020 could well be described as the Year of Ransomware. Security researchers around the globe who monitor such things have noted a sharp uptick in the use of ransomware this year, with well...
Are you an Office 365 user? If so, be aware that Microsoft is adding some powerful new protections to the software suite, designed to make you safer. Hackers commonly target Office 365 users with a...
What do you primarily use your PC for? It’s a more important question than you might think, because different use cases for your PC require it to be configured in different ways to optimize your...