In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn’t do serious harm to the infected system. It bleeds off computing resources, putting them to work for the miners who control the software, working for them to solve complex cryptographic …
How To Spot And Block Dangerous Emails
Spam filters can flag suspicious emails, but ultimately you are the last line of defense in preventing attacks from cybercriminals attempting to access personal information or sensitive data. If a breach does occur, we still have your back as your managed service provider. But the best defense is a good …
Popular NAS Device May Easily Be Compromised
Western Digital has a big problem, and if you use the company’s “My Cloud” network-attached storage (NAS) storage devices, you’ve got one too. The WD My Cloud service is enormously popular because it’s so convenient, allowing both business owners and individuals to store their files, perform periodic backups, and of …
New Google Chrome Feature Created For Better Password Security
Google is taking yet another important step to help save us from ourselves. The company is releasing a complete redesign of their Chrome browser, which is exciting. There’s one feature in particular, however, that bears taking a special look at. Perhaps the most significant change to the browser is the …
Air Canada Customers May Have Had Their Data Exposed
If you fly Air Canada and use their mobile app, it may be time to change your password. The company recently announced that between August 22nd and August 24th of this year, they detected “unusual log-in behavior,” and that a small fraction (some 20,000) of their 1.7 mobile app users …
Survey Shows Teens Are Concerned About Their Screen Time
According to a recent survey conducted by Pew Research Center, 54 percent of teens say that they spend too much time on their cellphones. Acknowledging you have a problem is the first, necessary step toward correcting it, and the survey reports that significant percentages of teens are taking steps to …
Fax Machines Might Be Gateway To Next Hacker Attack
Nothing bad could possibly happen to your company’s network if the only piece of information the hackers have is your fax number, right? Unfortunately not, according to recent research by employees at Check Point. They recently revealed details about not one, but two different REC’s (Remote Code Execution) techniques that …
Social Media App Filters Could Alter Beauty Perception
File this one away under “unintended consequences.” There’s a newly emerging trend in the medical community called “Snapchat Dysmorphia” that’s leaving plastic surgeons around the country to sound the alarm, and in some cases, scratch their heads in disbelief. Recent research conducted at Boston University has discovered that the digital …
Connecting To Airport Wi-Fi Puts Your Data At Risk
File this away under things you already knew. Coronet recently released a report entitled “Attention All Passengers: Airport Networks Are Putting Your Devices & Cloud Apps At Severe Risk,” and the news is about what you’d expect. The report was more than five months in the making. The analysts poured …