Keeping Your Accounts Secure It seems that each new week brings another alert about hackers stealing account information and a warning to change your passwords. Having a strong password is not enough, criminals can get to your account through weaknesses that are outside of your control. Constantly changing passwords makes managing those passwords challenging. There […]
Month: <span>August 2014</span>
TechCrunch has a great article on the direction of the next Windows operating system. It appears that the mobile emphasis of Windows 8 will be more balanced in the next operating system offering. The result is the same app-store and live tiles, but with a more Windows 7 like desktop experience. Read the TechCrunch article […]
For throw back Thursday, the Microsoft blog The Fire Hose has posted some great old school screen shots of Microsoft.com over the past 20 years. Check these screenshots out here.
The Washington Post reports that Russian hackers have stolen more than 1 billion (with a ‘b’) passwords. This breach was made by the group dubbed CyberVor and was discovered by Hold Security of Milwaukee. Some of the passwords have been sold and others have been used to disseminate spam. Users are advised to change their passwords. […]
FOX-IT and FireEye have partnered together and have been able to recover the private keys used in the CryptoLocker encryption which locks users out of their own files. They have also been able to reverse engineer the devastating ransomware. As a result of their efforts infected users can go to their website, upload an encrypted […]
As we pack cars with a growing level of tech, such perks and features could leave your car vulnerable to hackers and the results could be extremely serious. As CNN reported, researchers have demonstrated that cars can have brakes disabled or even have the steering wheel commandeered. These tests however were done with the hacker sitting […]
As you may already know, USB drives can infect computers with malware or other malicious software. Many liken the situation to reusing a contaminated needle. At present there aren’t many tools that address this potential entry point for hackers, so it is wise to be cautious with USB drives and what is stored on them as […]