Category Archives: Blog

Windows Makes Changes To Avoid Finger Command Security Vulnerability

Hackers use a variety of techniques to infiltrate systems and make off with data, but one of the more effective approaches is to use the system against itself. There are a number of executables residing within the Windows operating system, for instance, that can be used by an enterprising hacker to make off with a […]

Bluetooth Vulnerability Could Affect The Majority Of Devices

Do you have a smartphone, tablet, laptop or a “smart” device in your home? Or perhaps the better question is, how many of those devices do you have? Whatever your number is, be aware that researchers have unearthed a potentially devastating Bluetooth flaw that leaves billions of devices all over the planet vulnerable. The recently […]

Update Adobe Media Encoder Immediately With Current Patch

Adobe took the unusual step of releasing an out of band patch to address a trio of serious security issues in Adobe Media Encoder. The program is used by tens of thousands of people around the world to encode audio and video in a variety of formats. The three issues addressed by this patch are […]

Chrome Update Will Block Resource Intensive Ads

Are you a regular Chrome user? If so, you’ve got yet another reason to love the most popular browser in the world. Recently, Google announced the pending rollout of another new feature designed to minimize the use of your CPU’s resources. The coming update will evaluate the resource load requirements of web-based ads on every […]

Features Of The New Android 11 Phone

If you’re an Android user and you’re interested in getting the latest on offer from the company, Google has announced that they’re ready to release Android 11 to the general public. As you read these words, the new OS should already be available for Google’s Pixel line (Pixel 2 and newer), OnePlus, Xiaomi, OPPO and […]