1205, 2017

More security features for Office 365

By |May 12, 2017|Categories: Office|Tags: , , , , , , |

Microsoft has commercially released new products and upgrades that will secure company information. The threat intelligence and data governance features are designed for businesses that adhere to strict regulatory guidelines and need an extra layer of protection against cyberattacks. Here’s a detailed look at what these additions can do for [...]

405, 2017

The cloud is more secure than you think

By |May 4, 2017|Categories: Web & Cloud|Tags: , , , , |

Even to this day, the perception of cloud technology suffers from a reputation for bad security. But as time goes on we’re beginning to see that cloud security is almost always better than that of local area networks. So whether you’re considering a cloud web server or internet-based productivity software, [...]

2604, 2017

Microsoft Word bug: What you need to know

By |April 26, 2017|Categories: Office|Tags: , , , , , , , , |

Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information. [...]

504, 2017

What’s new in iOS 10.3?

By |April 5, 2017|Categories: Apple|Tags: , , , , , , , |

Apple enthusiasts are always eager to get their hands on the latest Apple update, and after seven long beta versions, they’re finally getting their wish. The new iOS 10.3 update, which is available on current iPhone, iPad, and iPod Touch models, comes with new built-in features and bug fixes. To [...]

1403, 2017

Malware on Android smartphones

By |March 14, 2017|Categories: Android|Tags: , , , , |

The average smartphone user doesn't give nearly enough consideration to mobile phone security. In fact, smartphone users are more likely to get anxious about their phone’s physical safety than the more serious threat of malware. Malware and other forms of cyber threats are far more common in desktops and laptops [...]

303, 2017

Is fileless malware a threat to you?

By |March 3, 2017|Categories: Security|Tags: , , , , , |

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger. But even if you’re not, staying abreast [...]

2702, 2017

Vulnerabilities on WordPress websites

By |February 27, 2017|Categories: Web & Cloud|Tags: , , , , , , , |

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to [...]

3101, 2017

The countdown begins for Windows 7 users

By |January 31, 2017|Categories: Windows|Tags: , , , , , , , |

As the saying goes: Out with the old, in with the new. That’s exactly what Microsoft is encouraging Windows 7 users to do as soon as possible. It’s been reported that Windows 7 in 2017 is so outdated that patches are unable to secure it anymore. Maybe it’s the nostalgic [...]

2701, 2017

Browsers leak sensitive info to hackers

By |January 27, 2017|Categories: Security|Tags: , , , , , |

The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much [...]

901, 2017

Flaw allows thieves to open locked iPads

By |January 9, 2017|Categories: Apple|Tags: , , , , , |

Have you ever worried about your tablet’s security? If not, you should. Networked gadgets are becoming increasingly interconnected every day, and just one social media account saved on a compromised iPad could lead to breaches on any number of other, more sensitive devices. If you own one of Apple’s popular [...]

Go to Top