Security

Protecting Your Network from Ransomware

Ransomware has gained a lot of notoriety lately as it seems to be taking down businesses, schools, and other organizations across the country.

keep Reading

Best Practices for Creating & Protecting Your Passwords

As technology changes, so do best practices for keeping a password secure. The National Institute of Standards and Technology (NIST) has created a new set of guidelines that in some ways contradicts the traditional rules of password safety.

keep Reading

Is Your Android Infected by Malicious Adware?

Recently, Google Play Store app developer “CooTek” has had a wave of sketchy apps banned from the Google Play Store. Security firm Lookout has accused him of deploying adware BeiTaAd in its apps.

keep Reading

Beware: Fake PC Cleaning Software!

Over the last several months, the number of incidents of fake PC cleaning software to hack computers has increased tremendously.

keep Reading

Is the Juice Worth the Squeeze?

The mobile phone uses the same port for charging as it does for data exchange. This means that when a phone is plugged into a charging port, it also has the option to share information stored on the phone’s device.

keep Reading