by Eric Clemens | Mar 8, 2018 | Web & Cloud
Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS. It’s a security feature that authenticates websites. It also protects the information users submit to them. Let’s go over some...
by Eric Clemens | Nov 27, 2017 | Security
Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. The results From...
by Eric Clemens | Aug 2, 2017 | Apple
In yet another sign that Apple computers are no longer being ignored by hackers, a successful piece of Windows-based malware has been rewritten for MacOS. Instead of encrypting data and holding it for ransom, OSX.Dok skips the extortion and simply steals your bank...
by Eric Clemens | May 15, 2017 | Security
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may...
by Eric Clemens | Apr 25, 2017 | Office
Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to...