1512, 2016

Gooligan malware wreaks havoc on Android

By |December 15, 2016|Categories: Android|Tags: , , , , , , |

Google has to contend with yet another malware attack that targets older Android users. Gooligan is a variation of the very successful Ghost Push malware that infected more than four million phones in 2015. This time the point of attack is the Google account. The malware does not attempt to [...]

2810, 2016

Vicious malware spreads through app stores

By |October 28, 2016|Categories: Android|Tags: , , , , |

Android developers are on the lookout for a malicious malware that is attacking app stores and users across the United States, France and other European countries. The malware, known as DressCode, is particularly dangerous to corporations that allow employees to use their own devices for work. Read on to find [...]

1910, 2016

How web monitoring increases productivity

By |October 19, 2016|Categories: Business|Tags: , , , , , , |

The internet is undoubtedly one of the most powerful tools for improving business productivity. But it’s also a magnet for procrastination. With unfettered access to the internet, it’s easy to stray away from your important work responsibilities. If done in moderation, five-to-ten minute breaks on Facebook, Twitter, and YouTube are [...]

2109, 2016

9 essential cybersecurity phrases

By |September 21, 2016|Categories: Security|Tags: , , , , , , , |

As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival -- or demise -- of a business. If you’re looking for a list of the industry’s [...]

1304, 2016

How is BYOD a security risk?

By |April 13, 2016|Categories: Security|Tags: , , , , , , , |

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your [...]

604, 2016

A crash course on the Blue Screen of Death

By |April 6, 2016|Categories: Hardware|Tags: , , , , , , , |

Everything seems fine at first, your PC is running normally but then a blue screen suddenly greets you. After restarting your computer you find that a lot of your unsaved work is gone. If this has happened to you before, rest assured, you’re not alone. What you’ve just encountered is [...]

2903, 2016

How to find out if your computer has a virus

By |March 29, 2016|Categories: Security|Tags: , , , , , , , , , |

Your computer has been acting up a lot lately. It keeps crashing, it’s slow and, to top it off, you keep getting pop-ups you don’t want to see. If these problems keep occurring then your computer may have a virus. So is there a way to prevent things like this [...]

2202, 2016

New Android malware can erase your phone

By |February 22, 2016|Categories: Android|Tags: , , , , , , , |

People easily get riled up over online security. With a quick Google search, you can find dozens of articles warning about Trojans, viruses and other security threats. But how many of them do you actually need to worry about? Really, it all comes down to threats that cause massive damage [...]

1602, 2016

Beware of a fake flash download on Macs

By |February 16, 2016|Categories: Apple|Tags: , , , , , , , |

Just when you thought your Mac was safe from all security threats, we have some troubling news for you. There’s a new form of scareware in town that’s been fooling Mac users into purchasing illegitimate software. And in all fairness, this one is quite convincing. If you want to ensure [...]

1201, 2016

Privacy Protection through Browser Extensions

By |January 12, 2016|Categories: Browsers|Tags: , , , , , , , , |

Even if you’re not currently taking adequate steps to protect yourself (and your company!) when you’re using the Internet, deep down you know you should be. Or maybe you already think you have enough precautions in place – but can you ever be too careful? In these times of Internet [...]

Go to Top