Category Archives: Blog

Browsers Are Waging War On Third Party Cookies

Do you use Mozilla’s Firefox browser?  If so, then you should know that their most recent release, Firefox 69 has a new feature designed to help prevent companies from tracking you.  If you update to Firefox 69, the new feature will be automatically enabled as part of the browser’s Enhanced Tracking Protection feature.  If you […]

Backup Still Necessary Even When Using Cloud Services

Do you keep all of your data on the cloud?  If so, you’re certainly not alone.  The past few years have seen a massive migration away from storing critical files locally to placing them on the cloud, where they’re more secure and accessible from anywhere you can get internet.  In fact, many people are so […]

Report Shows 118 Percent Increase In Ransomware Attacks In 2019

Ransomware roared onto the global stage in 2017. Companies and government agencies around the world felt the impact with widespread campaigns like NotPetya and WannaCry. By 2018, the number of ransomware attacks had begun to fall off while hackers found new tools to attack with, shifting toward cryptojacking, credential theft, and trojan malware. Granted, ransomware […]

Popular PDF Creator App Found To Have Malware

Do you use the PDF Creator App called CamScanner?  If you do, you’ve got plenty of company.  Since the app was first published in 2010, it has been downloaded more than a hundred million times. Unfortunately, Google recently pulled it from the Play store when they discovered that it began delivering malware to user devices. […]

Microsoft Is Extending Windows 7 Support For Only Some Users

There’s some good news for Enterprise users who are still using Windows 7.  By now, almost everyone is aware that the company is bringing support for the aging operating system to a close. The original time frame for formally ending support and for ending the issuance of security updates was set for as soon as […]

Hackers Are Using Resumes To Deliver Malicious Software

Hackers have used poisoned documents to deliver malware payloads for years. Recently though, researchers at the security company Cofense have spotted a new twist to the ploy, aimed squarely at HR departments. The recently detected campaign uses fake resume attachments to deliver Quasar Remote Administration Tool. It is affectionately known as RAT to any unsuspecting Windows user […]

Watch Out For Old Hacking Technique Offering Free Downloads

An old hacking technique is getting new attention from hackers around the world, and it underscores the fact that people must exercise extreme caution when it comes to deciding who to trust and where to download files from. Hackers have long been in the business of spoofing legitimate sites; making exact replicas of popular websites […]

Three Risks of Using Consumer Grade Networking Equipment for Business

  If you’ve been considering buying consumer grade networking equipment for your business as a means of saving money, you may want to rethink that approach. While the equipment itself is less expensive, it will probably wind up costing you more than it saves. In this video, we’ll outline three risks of using consumer grade […]

Another IRS Phishing Campaign To Watch Out For

The Internal Revenue Service recently issued a warning that all taxpayers should be aware of. The agency has received a growing number of reports concerning unsolicited email messages bearing the subject lines: Electronic Tax Return Reminder Automatic Income Tax Reminder These messages are not from the IRS, but rather, from spammers trying to steal your […]

Windows 10 May Make WordPad And Paint Downloadable Soon

There’s another chapter in the ongoing MS Paint saga. In case you missed the first part of the story, several months ago, Microsoft upset its user base when a Windows 10 Build took Paint out of the equation. They replaced it with an updated version of the software that supported 3D effects and other advanced […]