Recent Posts
May 13, 2020
Google Authenticator Update Allows Moving Between Devices
Authenticator apps are far and away more secure than getting a code via SMS text message. Users have been reluctant
Read MoreMay 12, 2020
Seven Vulnerabilities Announced for Computers with Thunderbolt USB-C Connectors
Thunderspy sounds like a movie title, but it's the name given to the multitude of vulnerabilities announced for any computer
Read MoreMay 11, 2020
Microsoft Trying to Stop Reply All Storms
One of the bad things about email is the ease to quickly reply to all recipients on a message even
Read MoreMay 07, 2020
USB4 is on the Horizon
The next generation of USB4 is coming, but what does it mean for the end user? Lifehacker posted information about
Read MoreMay 06, 2020
User Data Found on Resold Tesla Parts
Proper disposal of electronic equipment is a must to protect user privacy. You should be wiping hard drives for any
Read MoreMay 05, 2020
Serious iPhone Vulnerability in Mail App
CPO reported that an iPhone can be compromised just by opening up the Mail app. No clicking on a link
Read MoreMay 04, 2020
Face ID Doesn’t Work with a Mask
Shocker. If you are wearing a mask, Face ID doesn't work. Ars technica posted that Apple is changing the authentication
Read MoreApr 30, 2020
Turn On 2FA for Your Google Account
It is still amazing that users are so resistant to using two-factor authentication (2FA) for their accounts. For most 2FA
Read MoreApr 29, 2020
Top Five WFH Extensions for Google Chrome
Chrome is still the most used browser in the world by a huge margin. While we all work from home
Read MoreApr 28, 2020
Microsoft Patches Teams Vulnerability
Video conferencing has seen a tremendous increase since the beginning of the coronavirus pandemic. As a result, cyber criminals are
Read MoreApr 27, 2020
Microsoft Has Ruled – No More Double Spaces Following Punctuation
It's been a long-standing argument over the past several decades. Should there be two spaces following punctuation or just one?
Read MoreApr 23, 2020
Overreaction Over Video Conferencing End-to-end Encryption
It's no secret that Zoom is in the crosshairs for its usage of the term end-to-end encryption (E2EE). While there
Read More