Blog

Microsoft Word bug: What you need to know

April 26th, 2017
Microsoft Word bug: What you need to know

Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information.

Best new features in Windows 10

April 25th, 2017
Best new features in Windows 10

Creators Update contains the most significant upgrades to Microsoft’s Windows 10. Some of the stand-out features include application enhancements, improved user experience, and a few productivity features that may seem too small to be noticed. These upgrades were recently rolled out, giving reason to personal and business users alike to get excited.

The phishing craze that’s blindsiding users

April 24th, 2017
The phishing craze that’s blindsiding users

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam.

Mac Pro gets revamped

April 21st, 2017
Mac Pro gets revamped

Mac Pro users have long awaited the release date of the new workstation, and who could blame them when the current model has been available since 2013. Thankfully, Apple just confirmed that the revamped Mac Pro is on its way. From specs, features, and design changes, here’s the latest information we have about Apple’s high-end desktop.

Why you need to back up your mobile devices

April 20th, 2017
Why you need to back up your mobile devices

There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small gadget, mobile devices allow you to send and receive email, download and upload media files, store data, and even close business deals.

An essential checklist for WordPress users

April 19th, 2017
An essential checklist for WordPress users

Wake up. Take a shower. Get dressed. These are just some of the numerous tasks we do every single day. They may not be fun, but they are essential to our daily routine. Managing a website is very much the same. By going through the necessary steps, you can ensure the speed and security of your website.

Firmware: the threat most users overlook

April 18th, 2017
Firmware: the threat most users overlook

For decades, one of the most foundational principles of cyber security has remained the same: Always update and patch your software. But for most people, hardware is exempt from this process. They think of hardware as nothing more than a vessel for software to occupy — and that’s totally incorrect.

A 5-minute guide to migrating Android data

April 14th, 2017
A 5-minute guide to migrating Android data

When moving from one Android phone to another, how smoothly you are able to migrate contacts and settings often ends up determining how happy you are with the new phone. Even though there’s more than one way to go about it, each approach is a simple affair.

Virtualization review: What is it again?

April 13th, 2017
Virtualization review: What is it again?

Every now and then, we need to reset the conversation about virtualization and review how it works in its most basic form. With so many advances, it can be hard to keep up if you’re not a regular reader. This article not only defines virtualization and its benefits, it also includes a real-world workstation for you to experiment with!

What is virtualization?

The simplest definition is this: It’s the act of creating a virtual (rather than physical) version of something, including hardware platforms, storage devices, and computer network resources.

Did Microsoft commit a security breach?

April 11th, 2017
Did Microsoft commit a security breach?

In case you didn’t know, Microsoft provides Office 365 users with a free document-sharing platform called docs.com. It’s a great new tool for publishing files intended for public viewing. The downside is, sensitive documents are published without the file owners’ permission.