Microsoft is no longer supporting Windows XP but do you know which other versions of Windows they no longer support? Read on to find out and what you can do to stay protected and productive.
If you have a Google account, you have 15 GB of free cloud storage you can use between Google Drive, Gmail, and Google+ Photos. A Google account is handy to use as cloud storage for your photos, especially if you don’t really use Google Drive or Gmail. If you’d like a Google account or an additional one, sign up here. […]
The recently discovered Heartbleed bug allows attackers to read data that is supposed to be encrypted (protected) such as your log in information to a particular website. Somewhere around a quarter of all websites have been affected by this bug. After last week, many of the website originally affected have been patched. Once a website has been patched and you’ve changed your password for that website, then you’ll be protected from this bug going forward. […]
Mobile devices are tempting targets for thieves. There are a few precautions to make your mobile device harder to steal and easier to track and recover. […]
More and more people have the flexibility to work from home but if you find yourself doing more chores than work, it might be time to hit the road and find a good place to be productive. Before leaving your home or office, make sure to bring what you’ll need to be a savvy mobile worker. […]
Have you ever purchased a laptop that turned out to be a complete nightmare? Maybe you’re not a fan of trying to decipher what all the specs mean or fending off sales people trying to sell you more than you need. Whatever the case, here are a few tips to guide you on your way. […]
In martial arts, there are levels (belts) of competence in fending off attacks. The same applies to browsing the Internet: there are levels in fending off attacks on your privacy. There are different “moves” you make depending on if a potential attacker has access to the computer you’re using, the Internet connection you’re using or if they’re just a company on the Internet trying to track your browsing habits. […]
Spam comes in three different flavors: junk mail, webspam and comment spam. The main purpose of spam is to get you to buy stuff but it can also be used to boost traffic to specific websites and infect computers with malware.
There are three types of software that can creep onto your computer, each type more ninja-like than the one before it: The Barnacle Download, the Pop-Up Download and the Drive-By Download.
Several Java security vulnerabilities surfaced earlier this month that allow attackers to access computers visiting compromised or malicious websites. If you’re still reading, allow me to translate the previous sentence to English: if you visit a website that has code to take advantage of the Java security hole, then the code would install malware on your computer. If you’ve ever asked yourself “how did that virus/malware get on my computer?” this is one answer.