For This Ransomware, “Yes or No” Really Means “Yes or Yes”

new_petya_friend_400.jpg

The ransomware Petya (previously thought to have been eradicated) has unfortunately resurfaced, and it’s brought a friend to the party. Petya was delivered via an email containing an invitation to apply for a job, including the virus in an executable file that was disguised as a PDF job resume. When a hepless user clicked the […]

Tip of the Week: 4 Windows 10 Tips You’ll Use Again and Again

useful_windows_10_tips_400.jpg

It’s been almost one year since the release of Windows 10. Are you taking advantage of everything Windows 10 offers? Here are four of the best Windows 10 features that you’ll want to start using right away. Virtual DesktopsIf you’ve never used a virtual desktop before (not to be confused with desktop virtualization), it’s a […]

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

android_malware_400.jpg

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones […]

Ancient Greek Computer in Serious Need of Firmware Update

ancient_greek_computer_400.jpg

When you picture an old computer, do you see a giant machine that takes up an entire room? These days, people might consider even something like a CRT monitor and a device running Windows XP to be ancient. Yet, the oldest “computer” in the world may actually be a bronze contraption found off the coast […]

Tip of the Week: 5 Easy Ways to Move Several Files at Once

multiple_file_storage_400.jpg

File storage is a staple in the office, and chances are that even your work desktop is jam-packed with files and folders that could use a bit of sorting. This might include moving all of your files to different locations, but you don’t have to move each one individually. We’ll go over the many different […]

Newly Discovered Vulnerability Gives Reason to Worry for Every Windows User

badtunnel_vulnerability_400.jpg

A vulnerability has been discovered that affects all versions of Microsoft’s Windows operating system, including the long-unsupported Windows XP, going all the way back to Windows 95. The vulnerability, called BadTunnel, allows attackers to directly bypass system defenses and initiate a man-in-the-middle attack. The vulnerability isn’t limited to just Windows, either; it also affects Internet […]

How Your Business Can Take Advantage of These 4 Mobility Trends

enterprise_level_mobility_solutions_for_business_400.jpg

In a world where mobility is king, it can be challenging at best to implement new solutions without first taking into account how they can affect your business’s mobility. Especially with the cloud gaining ground, companies have their eyes on mobility and the requisite security, hoping to achieve greater flexibility and profitability by doing so. […]

Tip of the Week: 6 Truths to Guide Your PC Troubleshooting Efforts

shooting_trouble_troubleshooting_400.jpg

We’ve all ran into problems that weren’t easily solvable, even by technically-proficient people. In fact, it’s often the case that simple problems can be escalated far beyond where they deserve to be. Sometimes all it takes is a little outside perspective, and some out-of-the-box thinking, to fix an issue. The next time you run into […]

Microsoft Moves to Get a Piece of the Technology as a Service Market Share

microsoft_technology_as_a_service_400.jpg

Microsoft has been looking to cover more ground in the business environment by offering a new Technology as a Service (TaaS) offering, which will allow small businesses to purchase Surface products, accessories, and support for their devices, all with a monthly payment plan. Also, when it comes time to upgrade, customers can easily make the […]

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

password_security_400.jpg

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits. An analysis of the millions of stolen credentials by security company LeakedSource shows […]

3 Talk-to-Text Apps that Get the Job Done

apps_for_voice_to_text_400.jpg

Mobile platforms have given way to entirely new ways to develop and make use of apps. More business professionals than ever before are relying on their smartphones to get work done while out of the office, but the functionality of the on-screen keyboard interface has some of them stumped on how to stay productive. It’s […]