by Master User | Jun 29, 2016 | Blog
Now, you have another very good reason to upgrade to Windows 10. If you refuse to do that, then at the very least, you have a very good reason to move away from versions of Windows that are no longer receiving critical security updates (Windows XP, Windows Server...
by Master User | Jun 28, 2016 | Blog
If you use Citrix’s “GotoMyPC” remote desktop service, you’re going to have to change your password the next time you log on. The company was hit with what it describes as a “very sophisticated attack,” and it’s not taking any chances. Because they’re not sure how...
by Master User | Jun 27, 2016 | Blog
The University of Calgary recently submitted to the will of hackers and ponied up $20,000 to get their files back after more than 100 computers were locked via ransomware. Almost every security expert agrees that paying such a ransom is the wrong move, but the...
by Master User | Jun 25, 2016 | Blog
Once more into the breach with Twitter. A company called LeakedSource claims to have gotten its hands on a database containing some 32 million Twitter passwords associated with accounts via email (rather than user name). Although per the company’s information on the...
by Master User | Jun 24, 2016 | Blog
The recent revelations about hundreds of millions of user names and passwords showing up for sale on the Dark Net from sites like Twitter, LinkedIn and MySpace has sent ripples of uncertainty through the entire digital world. If the data breaches of those companies...
by Master User | Jun 23, 2016 | Blog
More and more business are migrating increasing amounts of data to the cloud. That’s generally seen as a good thing, but there’s a fly in the ointment. The cloud, which is regarded by many to be safer and generally more secure, is seeing a rise in malware infected...