877 422 1907

Posts Categorized: Uncategorized

Computer Security Watch – April 14 2014

Computer Security Watch – April 14 2014

April 14, 2014

Lucky Day For Me! Not Lucky For 552M People In 2013.    Today’s Top Threat SONAR.Zbot!gen3 The Sonar Zbot is a variant of the older Zeus bot, it is designed to steal private information and pass it back to an offsite source. The most common way to get this virus is through spam emails and […]

Read More

Computer Security Watch – April 8 2014

Computer Security Watch – April 8 2014

April 8, 2014

Copycat apps and an official end of Windows XP support.   Today’s Top Threat Trojan.Shylock!gen9 The Shylock virus seems a bit underwhelming at first read, but when a virus adds malicious code to network traffic it can get really annoying. Usually when you see a Shylock style virus you tend to have a few of […]

Read More

Computer Security Watch – April 4 2014

Computer Security Watch – April 4 2014

April 4, 2014

Today’s Top Threat O97M.Crigent This virus hides itself inside Microsoft Word and Excel files, and then connects to remote hosts worldwide to download more heinous files. The best defense is to make sure you have a secure firewall up and running. Today’s Top Stories In 2013, the malware UPATRE was noted as one of the […]

Read More

New Tool Could Make Software Unhackable

New Tool Could Make Software Unhackable

February 11, 2014

Researchers from IBM and Microsoft have teamed up to make a huge breakthrough in unbreakable cryptography. This huge new development brought to life by the UCLA and MIT team gives us hope that encryption could go further than just protecting an output, and actually protect an entire program. This method of program obfuscation has always […]

Read More

What Is Spyware and How Do You Remove It?

What Is Spyware and How Do You Remove It?

January 14, 2014

Spyware is a software that secretly gets installed on your computer and can track and record everything you do. They can record what you type, such as personal information you may enter on websites. This information can be used to steal your identity and do massive amounts of financial damage. Generally, spyware gets installed along […]

Read More

What You Need to Know to Become a Computer Hardware Expert

What You Need to Know to Become a Computer Hardware Expert

December 22, 2013

Knowing how the components of your computer can change your performance is key. You want to get all the power out of your machine that you can in order to have the best possible experience for your type of computing. Simply reading the big words and fancy numbers on the box that your computer came […]

Read More

New Software Allows Users To Control Their Computers With Their Eyes

New Software Allows Users To Control Their Computers With Their Eyes

December 4, 2013

We have come to a day in age, where the tech and software that seemed mere fantasy has now become, or is starting to become more of a reality. With new features like fingerprint scanners, motion sensors and motion control, and even 3-D imaging and printing, the world of science fiction is starting to phase […]

Read More

Supercooling Your PC With Magnetic Fields

Supercooling Your PC With Magnetic Fields

November 25, 2013

It’s a known fact that mechanical stress helps the transfer of thermodynamic energy in a closed system. This happens every time you press something that you are cooking into a pan on your stove of on a grill, it greatly increases how efficient the heat transfer from the metal to the food is. Generally we […]

Read More

Indian Women’s “Hackathon” Works On Humanitarian Projects

Indian Women’s “Hackathon” Works On Humanitarian Projects

November 15, 2013

When we think “hacker”, nine times out of ten , we think of someone who is using their gift for something that could be potentially malicious or using their gift to further their own gain. Hacking has been around for a while, though, and has even become so popular that it has been featured in […]

Read More

Does Your Business Save Documents to a Computer

Does Your Business Save Documents to a Computer

October 30, 2013

By Donna Essex Small businesses are holding more confidential information on their computers than ever before. As their businesses expand, just how safe are the documents and data stored on their computers? With customer confidentiality at the hands of a business, it is mandatory that data security be brought in to protect the increasing amount […]

Read More