Blog

Yahoo Is Compensating Victims Of Their Massive Data Breach

Yahoo has the dubious honor of having been on the receiving end of the largest data breach in history. As a consequence, ...

IBM Invests Billions To Purchase Popular Red Hat Linux

IBM has recently announced what is to be the largest open source acquisition in history.  They're buying Red Hat for a staggering ...

Deleting Your Google Search History Will Soon Be Easier

Google is rolling out some important changes that will make it easier for people who use their services to control their data. ...

Google Finally Cracking Down On Manufacturer Device Updates

Security in the Android ecosystem is awful.  There's just no other word to describe it. In large part, the blame for that ...

Hackers Now Targeting Girl Scouts, Raising Privacy Concerns

As far as hackers are concerned, no target is safe.  Not even the Girl Scouts. Recently, one of the Girl Scouts' official ...

Some Tumblr Users May Have Had Their Data Breached

Do you use Tumblr?  If so, be aware that your personal information may have been exposed. Tumblr recently added a feature called ...

New Fake Antivirus Tech Support Scam Tricking Users

McAfee has long been a popular target of scammers, but recently, they've changed the nature of their game. In years past, they'd ...

3 Risks of Using Consumer Grade Hardware in Your Business

  In today’s advanced work environment, technology is a standard part of the day to day operation of the business. Making your company’s computers, printers, and other ...

3 Ways to Protect Yourself After a Data Theft

  Data theft. You hear about it in the news on nearly a weekly basis. Hackers are targeting small businesses like yours more and more. It helps ...

The Tips to Keep Safe on Social Media

  Social media has become a big part of our day to day lives. Whether you use social sites such as Facebook, Twitter, Linkedin or any other ...