The Latest in Tech Today

Conspiracy Theorists Grasping at 5G

Conspiracy Theorists Grasping at 5G

Conspiracy Theorists Grasping at 5G  There are always those who will believe the most phenomenal theories when they someone with scientific authority says comments on it.  That is the case with the conspiracy theory that the radiation from 5G cell towers creates...

read more
Pandemic Customers Buy but Amazon Can’t Deliver

Pandemic Customers Buy but Amazon Can’t Deliver

Pandemic Customers Buy but Amazon Can’t DeliverWith our shopping abilities deeply curtailed by this forced government self-isolation to prevent the spread of COVID-19, we have turned to those who can supply our needs through online shopping.  Turns out that for many...

read more
Hijacked Routers – Securing Them Requires Password Reset

Hijacked Routers – Securing Them Requires Password Reset

Hijacked Routers - Securing Them Requires Password ResetHackers have found a way to hijack user accounts and change the user settings on Linksys routers that use Smart WiFi accounts. When this is done users are now redirected them to malware sites. The Smart WiFi...

read more
Your Zoom Account is Worth One ‘Copper’ to Hackers

Your Zoom Account is Worth One ‘Copper’ to Hackers

Your Zoom Account is Worth One ‘Copper’ to Hackers Zoom has gained popularity during this pandemic’s require shelter in their homes. However its widespread use has unveiled to many the privacy and security issues inherent in this platform. These inherent...

read more
Can America Compete? US iPhone vs Chinese iPhone

Can America Compete? US iPhone vs Chinese iPhone

Can America Compete? US iPhone vs Chinese iPhone We should be manufacturing the products we use in America. American companies can compete with China and it actually would not be that much more expensive.  For years we have heard about the Global supply chain but when...

read more
Tencent: The biggest name in Entertainment

Tencent: The biggest name in Entertainment

Tencent: The biggest name in Entertainment Tencent is a Chinese entertainment conglomerate who buys up every type of entertainment they can. These entertainments include movies, video games, music, comic books and even technology including messaging services that have...

read more
Pandemics breed criminal scams and exploits

Pandemics breed criminal scams and exploits

Pandemics breed criminal scams and exploits Mules are a common way for criminals to move their merchandise or ill-gotten gains around.  Whenever there is something big in the news, you can bet that there will be criminals who will exploit it.  It has never been more...

read more
HP Computers Vulnerable to Attack

HP Computers Vulnerable to Attack

HP Computers Vulnerable to AttackHave you purchased an HP Computer for you home or business?  Turns out that their pre-installed Support Assistant Utility is quite insecure by design.  It is capable of exposing 250 client functions and is filled with vulnerabilities...

read more
Fingerprint Authentication is Bypassable!

Fingerprint Authentication is Bypassable!

Fingerprint Authentication is Bypassable!Eighty percent of fingerprint authentication systems were capable of being bypassed. With numerous companies marketing an alternative to password access they have jumped on biometric fingerprint athentication as the best...

read more

Time to Invest in Cybersecurity

Time to Invest in CybersecurityEvery company no matter the size is at high risk for a cyberattack.  With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime.  Much...

read more
Watch out – Porn Scams by Email are back!

Watch out – Porn Scams by Email are back!

Watch out - Porn Scams by Email are back!Cybercriminals will try just about any tactic they can to get you to click on and accept their malware.  One of their most successful have been scams related to pornography. These scams surround the possible situation that the...

read more
How to Evict Attackers Living Off Your Land

How to Evict Attackers Living Off Your Land

How to Evict Attackers Living Off Your LandWhy invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you? More...

read more
Introducing Zero-Trust Access

Introducing Zero-Trust Access

Introducing Zero-Trust Access   Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...

read more
The Risky Business Gamble of AI

The Risky Business Gamble of AI

The Risky Business Gamble of AIThe worldwide pandemic of Covid-19 has increased the amount of traffic on all of the social networks.  With almost everyone at home, they have more time to comment and research and share stories and opinions.  This means that these...

read more
Being Successful While Remote Working

Being Successful While Remote Working

Being Successful While Remote WorkingIf you’re starting to work from home or just got a remote position, you’re probably looking forward to not spending time on a frustrating commute and staying in your pajamas until noon. Enjoy that for the first day or two! But if...

read more
Malcare WordPress Security