Expert Strategic IT Advice

Is the Government Spying on You?

Judge Rules No Warrant Needed for FBI to Hack Private Computers   In taking the epidemic of hacking to a whole new level, a judge for the federal court for the Eastern District of Virginia has ruled that…

A Dangerous Loophole: Lenovo’s Security Mishap

Why Lenovo is telling users to remove an application because of a dangerous loophole. Lenovo has been urging its users to remove one of its applications after the discovery of a serious vulnerability. Let’s look at the definition…

Paying Off Ransomware Is a False Savings

It started with personal computers and then morphed to attack business data. The “it” is ransomware, and it is the latest way that black hat hackers have caused concern for individuals and businesses alike. Ransomware is when an…

Does Facebook Spy on Me?

There’s little doubt that Facebook collects plenty of information about most Internet users. It employs activity logs, cookies and “Like” buttons to monitor both members and non-members. This helps the social network sell highly targeted advertising. Some recent…

Phishing Attacks Now Have Ransomware Payloads

Do you back up everything each hour when your system is busy, and at least once a day, if it is not? Do you disconnect your backup devices from your system when they are not actually backing up?…

Windows 10 Is Popular, But Windows 7 Still Rules

How popular is Windows 10? Released on July 29, 2015, Windows 10 received generally favorable reviews. TechRadar.com reviewer Dan Grabham’s verdict: “Feature-wise, Windows 10 is the new Windows 7. It’s robust, pleasant to use and – perhaps best…

Apple iOS 10 Features Miss the Mark: Dark Mode, Keyboard and Other Issues Leave Users Wanting More

In June, 2016, Apple introduced iOS 10, complete with upgrades to iOS 9, as well as a few fantastic secret features that the industry was expecting any minute. However, as with any great product, there are usually a…

Shut Down: How Security Thwarted a 5-Year-Long $25 Million Heist

For a prime example of why companies need high-end security, take a look at how a bank thwarted a 5-year-long $25 million heist. If your business happens to work with highly sensitive data, it’s incredibly important that you…

What Can We Learn From the Cyberattack on Russia’s Facebook?

European social network VK.com has been making headlines since becoming the victim of a major hack. The platform, based in St. Petersburg, is known as “Russian Facebook” since the two sites are similar in many ways. VK, previously…

When Will the Password Become Obsolete and What Will Follow it?

As internet technology broadens in scope and offers increasing convenience, web users become increasingly reluctant to use traditional login and password credentials to sign up for new services. While the password, when used correctly, is a very reliable…