Menu

Blog

Technology News

Read these tips to stay secure during the holiday season!

9 tips you don't want to miss

During the holiday season, being secure is most important! Read these tips to make sure you're doing everything right!
0 Comments
Article rating: 5.0

Apple's OS X Security Honeymoon Is Over

Apple OS X is under more scrutiny than ever

Due to Apple’s increased market share, it’s now apparent that OS X wasn’t as secure as people thought, and it was a simple matter of malware writers not targeting Apple. Now, the honeymoon is over and there is a large increase in attacks against Apple operating systems, so the same security measures that Windows users take and Apple users have ignored, will have to be used.
0 Comments
Article rating: 5.0

Feb. 1 - Happy Change Your Password Day

Enjoy Responsibly...

Mardi Gras ain't got nothing on today's festivities!
Author: Sheri Mora
0 Comments
Article rating: No rating

Infected Android apps can hijack your texts

11 Android apps have been found to contain malware that is rigged to automatically send text messages from your Google Android smartphone to phone numbers in China.
Author: Sheri Mora
0 Comments
Article rating: No rating

Cloudy, With A Chance of...

The Integrity of Your Data

Security, liability, connectivity, disclosure (data location and if/when it is moved), backup and recovery procedures, and more should all be reviewed closely.
Author: Sheri Mora
0 Comments
Article rating: No rating

Computer Security Updates

 
Author: Sheri Mora
0 Comments
Article rating: No rating

Security Alert

Zbot (a.k.a. Zeus) Wants to Steal Your Financial Data

A recent security threat called Zbot, (a.k.a. Zeus) has been causing quite a buzz, particularly in the finance industry. In addition to sending spam, executing denial-of-service attacks, and distributing malware, its primary purpose is to steal financial information from infected computers.
Author: Sheri Mora
0 Comments
Article rating: No rating

Mobile Device Security

Smartphones, netbook, e-reader vulnerability

As technology becomes more efficient and interconnected it also becomes more vulnerable.
Author: Sheri Mora
0 Comments
Article rating: No rating
RSS