New Security Threat Exposed by Media

by on 06/03/2014 in Online Security Tools, Security, Virus Threats

New Security Threat Exposed by Media

Now that the media has warned you about what could happen the next 2 weeks with security breaches on a user’s computer, they also gave Cyber Criminals a head start. Why would you even call out something so significant? Why not let the manufacturers of antivirus and anti-malware software do their job with silent updates […]

Full Story

The Dangers of Counterfeit Electronics and How to Avoid Them

by on 06/02/2014 in Scams & Hoaxes, Security

The Dangers of Counterfeit Electronics and How to Avoid Them

It sounds like something out of a Hollywood blockbuster: A military fighter jet mechanic discovers a part on a plane that isn’t quite right. Upon further investigation, officials discover that the computer chip, a piece no bigger than an inch square, is not in fact the military-grade advance technology that was touted by the manufacturer, […]

Full Story

Resolving the Error “Your startup disk is almost full” on Mac OS X

by on 05/15/2014 in Hardware, Mac

Resolving the Error “Your startup disk is almost full” on Mac OS X

Macintosh HD is the boot or startup disk of your Mac machine, containing millions of system files as well as the applications you install, which means the more applications installed on your Mac, the lesser drive space you have left on the startup disk. In such a situation, you might come across the error, “Your […]

Full Story

Windows XP Support’s End Can Be A Hackers Playground

by on 05/13/2014 in Microsoft, Security, Vulnerabilities

Windows XP Support’s End Can Be A Hackers Playground

Windows XP was released by Microsoft back in 2001. Though the company has come out with various new operating systems since then, many computer users have chosen to stay with Windows XP. In fact, estimates are that this popular operating is still used on around one third of all computers around the world. Even in […]

Full Story

Malicious Apps: What They Really Do

by on 05/07/2014 in Security, Smartphone Threats

Malicious Apps: What They Really Do

If your employees use mobile devices for work — their own or corporate-supplied — there’s a good chance that you’ve heard about malicious applications and the potential dangers they pose to businesses. There have been multiple studies showing that even applications from trusted sources can contain malware and the risk of infection increases in BYOD […]

Full Story

Not Every Threat To Your Data Is Invisible

by on 05/02/2014 in Computers, Consumer Tips, Security

Not Every Threat To Your Data Is Invisible

In the last ten years or so, a wide variety of threats to computer data has been identified and addressed. Viruses, Trojans, hackers, and many other enemies have emerged and been battled. In addition, damaged or failed hard drives have been circumvented by better repair techniques and external storage like the Cloud. Lost in all […]

Full Story

A Fair Comparison Between the Human Brain and the Hard Drive

by on 04/24/2014 in Hardware

A Fair Comparison Between the Human Brain and the Hard Drive

Is there any similarity between the computer memory and human brain? I guess there would be at some level at least. The human brain might be the inspiration for the scientists who developed computer memory. You might not believe this theory since there is no evidence proving its worth. However, human brain contains about 100 […]

Full Story

How Private is Your Information on Social Media?

by on 04/14/2014 in Security, Social Networking

How Private is Your Information on Social Media?

Is your private information really private when you use social media? Not really, as it turns out. Over the last few months, the media has been flooded with stories about privacy hacks and breaches within the major social media platforms—often by the social media companies themselves! The most recent problem and breach of privacy to […]

Full Story

Yahoo Email Suspicious Activity becoming the Norm

by on 04/04/2014 in Security, Security Info & Tips

Yahoo Email Suspicious Activity becoming the Norm

Have you been notified by Yahoo due to suspicious activity on your email account? I am sure you have and it’s becoming far to frequent in the last year.  I have two accounts and I get notifications at least every other month about usual or suspicious activity on my email account. I have yet to […]

Full Story

Court Notice to Appear Scam

by on 03/19/2014 in Scams & Hoaxes, Security

Court Notice to Appear Scam

There’s an email purporting to be from a court, claiming that the recipient appear on the date and time indicated in the email. This email has an attachment notification that is harmful to the user’s computer if the file is downloaded and extracted. The zip file is loaded with a Malware executable. The email is […]

Full Story

Product Review – Stellar Phoenix Mac Data Recovery 6.0

by on 03/12/2014 in Data Recovery, Mac

Product Review – Stellar Phoenix Mac Data Recovery 6.0

If you ever experienced lost data from a hard drive crash or other storage device, you know how it feels especially when you never backed up your data. It is impossible to recapture all the data off a Mac, even if you are wise to have configured a Time Machine to take care of backups. […]

Full Story

Deploying Applications on Networked Windows Computers

by on 02/13/2014 in Microsoft, Windows 8

Deploying Applications on Networked Windows Computers

Introduction To install an application on a system, your physical presence is required as you’ll need to go through certain wizard based steps and complete necessary steps before using that application. However, using modern technology and tools, IT administrators and managers can now install as many applications as they want from a remote location over […]

Full Story
Page 3 of 134« First...234...Last »