3 of the Most Troubling Cyberattacks in 2021
Cybercriminals were very busy in 2021. Here are three of the most troubling cyberattacks they perpetrated. The year 2021 was a busy year for cybercriminals — and for the US Federal Bureau of Investigation’s (FBI’s) Internet Crime Complaint Center. “IC3 saw complaints increase nearly 70% between 2019 and 2020,” said the FBI. “The latest numbers […]
What Businesses Need to Know about Upgrading to Windows 11
Microsoft recently released the newest version of its flagship operating system software. Here is what you need to know about Windows 11 to make an informed decision about when to upgrade the computers in your business. Although “Brings you closer to what you love” sounds like a slogan you’d find on Subaru’s website, it is […]
10 Million Android Devices Have Been Infiltrated by GriftHorse Trojan Apps
Disguised as legitimate apps, the GriftHorse malware has found its way onto more than 10 million Android devices. Learn how to determine whether your phone is one of them. Mobile malware dubbed GriftHorse has found its way onto more than 10 million Android devices in more than 70 countries, including the United States. Cybercriminals are […]
Three Extremely Risky Practices to Avoid
A common question among businesses looking to improve their cybersecurity defenses is “Where should we focus our efforts?” A good place to start is to make sure your company is not engaging in risky practices. Here are three bad practices to avoid.
How to Tame the “News and Interests” Box
Microsoft quietly added the new “News and interests” feature to the Windows 10 taskbar. This feature can launch without you explicitly starting it, causing a big box to block part of your computer screen. Find out what you can do to control it. If you use Windows 10 often, this might have happened to you: […]
What Businesses Need to Know about the Semiconductor Chip Shortage
The semiconductor chip shortage is real and not simply scarcity marketing. Find out why there is a chip shortage, the problems it is causing, and how businesses can cope with the situation.
T-Mobile Breach Exposed the Personal Data of 54 Million Customers
The T-Mobile data breach in August 2021 was massive. Find out what data was stolen, what T-Mobile is doing to help customers affected by the breach, and how to protect yourself even if you are not a breach victim.
The Latest Data Breach & Why It Keeps Happening
The growing value of information is increasing the incentive of hackers to obtain data from both individuals and organizations. These incidents include ransomware attacks in which the perpetrator encrypts the victim’s data or threatens to publish that data unless the victim pays a ransom. Another tactic is to simply sell the information, either to a […]
Using Mobile Hotspots Safely
Connecting to the internet in public incurs additional security risks regardless of the specific computing device you use. You’re in close proximity with people you don’t know, which could include hackers trying to use your access without your permission. This occurrence could increase your mobile bill if the additional data usage causes you to exceed […]
You Can Now Stop Your iPhone Apps from Tracking Your Activities
Apple has rolled out App Tracking Transparency (ATT) feature in the iOS 14.5 update. Find out how this feature works and why some groups are applauding ATT while others are fighting it. For years, smartphone apps have been tracking where users go and what they do in the digital world. (A humorous but telling video […]