Recent Posts
Aug 09, 2018
Easier to Crack WPA/WPA2 than Previously Thought
We already knew that WPA2 was susceptible to cracking (Krack Attack) last year. It's bad enough that WPA2 is vulnerable,
Read MoreAug 08, 2018
Promotion: SpiderOak Unlimited Backup for $179
Cloud storage has become pretty popular the last few years. Even though cloud storage is relatively cheap, you do need
Read MoreAug 07, 2018
Google Announces Android P Name
Well, the rumors are over. Google has historically named the Android operating system using a letter of the alphabet and
Read MoreAug 06, 2018
15 Things to Avoid Being Hacked
Times have changed. The bad guys are constantly trying to attack your computing devices and mobile phones. The goal is
Read MoreAug 02, 2018
Edge Now Supports Sign-in Without a Password
Everybody wants to jump on the truck and support login credentials with something other than just a user ID and
Read MoreAug 01, 2018
Galaxy S10 Feature Not Available on an iPhone
The Samsung Apple battle continues for another year. Apple introduced its iPhone X (call it ten to tick off the
Read MoreJul 31, 2018
Three VPN Deals for Everybody
I've often said that everybody needs some sort of VPN service to protect data transmissions. The issue is cost for
Read MoreJul 30, 2018
Turn Off Those Distracting Outlook Message Notifications
By default, Outlook has all kinds of ways to let you know you have a message. The problem is that
Read MoreJul 26, 2018
Free Chrome Extension Prevents Cryptojacking
Ransomware is still prevalent, however there is a new favorite attack that is gaining in popularity. Cryptojacking is where your
Read MoreJul 25, 2018
Bluetooth Pairing Vulnerable to Attack
Threatpost reported that researchers at the Israel Institute of Technology have identified a security vulnerability in the Bluetooth specification. The
Read MoreJul 24, 2018
Hmmmm….Can’t Recover Data From a Broken New MacBook Pro
One of the things we do is digital forensics. That may mean recovering data from "dead" drives or otherwise inaccessible
Read MoreJul 23, 2018
Which 16 Popular VPNs Leak Data?
Secure communications means encrypting the data stream. You definitely want to consider using a VPN if you are concerned about
Read More