By it on April 25, 2017

The world in which we live gets more technologically advanced every day and things that were previously accessible to only a select few have now become available to pretty much everyone. During the 1980's when personal computers were the newest thing

Continue reading ...

Top 10 Vulnerabilities

By it on April 18, 2017

Intel Corp is a leader in the tech world of cyber security and uncovers an average of 245 new computer related threats daily. The experts at Intel have developed a Threat Dashboard that lists all the current threats, vulnerabilities, ransomware, expl

Continue reading ...

Potentially Unwanted Programs (PUPs)

By it on April 9, 2017

The term Potentially Unwanted Programs or PUPs refers to software programs that contain possibly malicious adware or cause other unspecified objectives like installation of toolbars or nefarious programs. The title was given to this type of softwa

Continue reading ...

Yahoo Security Breaches

By it on March 30, 2017

Yahoo has been repeatedly victimized by nefarious high-profile hacking incidents one of which affected over half a million account holders. Several months after that attack, Yahoo admitted to having been the victim of another breach dating back to 20

Continue reading ...

Problems with WordPress

By it on March 24, 2017

It's not surprising that tech companies based in the United States are favorite targets of cyber hackers and unknowingly become breeding grounds for nefarious activities that include global terrorism. These activities focus on American tech companies

Continue reading ...

Is Alexa Spying on You?

By it on March 16, 2017

Amazon's contributions to the tech world continue with the introduction of Alexa which is a "virtual personal assistant" that uses Amazon Echo (hands-free speaker system) to provide audio to multiple electronic devices for purposes of asking and rece

Continue reading ...

1 2 3 4 5 6 7 Next