Recent Posts
Mar 01, 2017
Patch Your Password Manager Now!
You should be using a password manager to store all of your logon credentials and other pieces of important digital
Read MoreFeb 28, 2017
Windows 10 Can Control Which Win32 Apps Can Be Installed
A major headache for system administrators is controlling what employees install on their devices. It doesn't matter what the firm's
Read MoreFeb 27, 2017
Amazon Alexa Hit the 10,000 Skills Mark
Third party developers can add additional features to Alexa by coding a "skill." As an Alexa user, you then go
Read MoreFeb 23, 2017
Can You Recognize a Phishing E-mail?
According to Verizon's 2016 Data Breach Investigations Report, 30 percent of phishing e-mails are opened. That's a pretty staggering number.
Read MoreFeb 22, 2017
Stop Autoplaying Facebook Videos
One of the most annoying things that can happen while surfing the Internet are video files that automatically play when
Read MoreFeb 21, 2017
No More JavaScript Attachments for Gmail Users
Malware infections typically come from hyperlinks in an e-mail message that download the bad stuff. Attachments with a malicious payloads
Read MoreFeb 16, 2017
Office 365 and G Suite Comparison
InfoWorld has published a post that details a comparison of the capabilities and differences of Office 365 and Google's G
Read MoreFeb 15, 2017
CosmoLex Practice Management Integrates Bank Data Feeds
Leave it to our friend and colleague Bob Ambrogi to once again scoop the news in legal technology. Bob reports
Read MoreFeb 14, 2017
Mac Users Not Immune to Viruses Despite Past Beliefs
For years and years, Apple users have believed that Macs are so secure that they are immune to malware infection.
Read MoreFeb 13, 2017
Apple Caught Saving User Data without Permission Again
Computer forensics company Elcomsoft warned that Apple has been saving Safari browser history for over a year even though users
Read MoreFeb 09, 2017
Signal Encrypted Communication Moving to Video
I'm a big fan of Signal, the encrypted text and voice communication application by Open Whisper System. So is Edward
Read MoreFeb 08, 2017
76 iOS Apps Vulnerable to Traffic Interception
Transport Layer Security (TLS) is the current method for protecting communications, which has superseded Secure Socket Layer (SSL). Researchers have
Read More