Blog
Pokemon Go Privacy and Physical Concerns
Pokémon Go has proved incredibly successful in the US and other playing regions. The massive and rapid uptake by consumers of the augmented reality game resulted in its creator Nintendo stock jumped by 70 percent, boosting its market value from £13bn to £19.6bn....
McDonalds to End Streaming of P*rn In Their Restaurants
Enough Is Enough (EIE), an Internet safety organization, praised the McDonald’s corporation® for their decision to filter public Wi-Fi from pornography and child pornography. EIE launched its “National Porn Free Wi-Fi” campaign” in the fall of 2014, with nearly...
Were you planning on downloading the Pokémon GO APK? Beware fake versions!
Since 2015, thousands of aspiring Pokémon trainers have been waiting for the release of Pokémon GO, the augmented reality game that will allow players to catch hidden Pokémon’s in the real world and conquer “gyms” through the internet, traveling both physically as...
FDIC accused of being hacked and covering it up!
Multiple news agencies are reporting (quietly we think) that the Federal Deposit Insurance Corporation (FDIC) was hacked between 2010 and 2013 - and that the US Government tried to cover it up! WASHINGTON (Reuters) - The Chinese government likely hacked computers at...
CYBERCRIME ALERT: Don’t be a money mule
You know the old saying: "If it sounds too good to be try, it probably is!" - that always holds true for a class of money laundering crimes which could turn you into a "Money Mule"! Read more to help protect you and your loved ones from fraudulent schemes where...
PATCH DAY: Adobe, Microsoft Patch Critical Security Bugs
PATCH DAY: Both Adobe and Microsoft Patches are Critical Today This month's big patch day brings 'critical' updates from both Adobe and Microsoft. Adobe Patches Flash and Reader Adobe pushed out a critical update to plug 52+ bug in Flash Player an update to patch in...
Avast! acquires AVG in a deal worth $1.3bn
In their blog, Avast! has laid out their vision of what the two joined companies will be together. buys Avast! Blog Post: Forward-Looking Statements This communication contains forward-looking information that involves substantial risks and uncertainties that could...
A small business security plan – part 2
In the 2nd part of our article, "What does a real world small business security plan look like?" we have finally got into the office where your PCs, macs and perhaps servers are are located. But before we start getting into solutions you need to buy, we must again...
Could Your Business Survive a Cryptor
The days of simple malware - developed by amateurs that were just looking to make mischief - are long gone. Organized crime lies behind much of today's malware...and the focus is on making money. It’s possible that you or someone in your company will get held to...
Wendy’s releases list of more than 1,000 restaurants hit in data breach
Back in January we reported that Wendy's was investigating a possible breach - that was confirmed in June of this year when Wendy's admitted that they had a breach which was larger than originally thought. Now we have the list of 1,000+ restaurants which were affected...
BBB Warning: Summer Festival Goers Beware!
The Better Business Bureau (BBB) is warning summer festival goers to be on the lookout for festival scams... This summer, don't fall for a festival scam. Scammers are tempting would-be festival goers into buying tickets for events promising all-you-can-eat crabs, live...
What does a real world small business security plan look like?
So you run a small business and you have a nagging feeling that you don't have an adequate business security plan in place - you know this - your staff know this and it's been worrying you, but you put it off because the task is daunting and it simply isn't your...
Password Strength: It’s not about special characters!
Did you see our most recent Computer Security Solution blog post? Many of us use dozens (or hundreds) of online websites that need a password. Traditionally, experts have offered two pieces of advice about passwords: first, strong passwords are those with random...
Password Strength: It’s not about special characters!
Many of us use dozens (or hundreds) of online websites that need a password. Traditionally, experts have offered two pieces of advice about passwords: first, strong passwords are those with random characters and second, avoid using the same password for different...
ESET Secure Authentication Demo Video
Do you have a need for Two-Factor Authentication? ESET Secure Authentication offers enterprise features at a small business price. Integrates into your domain in as little as 5 minutes, and is centrally managed. Watch the demonstration video, then request a trial by...
Acer Suffers Massive Data Breach
Acer has experienced a major data breach, with up to 34,500 of its customers thought to be affected. It has already submitted a “breach notification sample” to the Office of the Attorney General in California, which states that one of its ecommerce sites was...
more password attacks stemming from past breachs
Carbonite Is Latest Victim Of Password Reuse Attack Back-up services provider carbonite has asked all their users to reset passwords, claiming that hackers used details from earlier breached websites. Carbonite appears to be the latest victim of a password reuse...
Update Flash and Update it now
You mean you're still Running Flash? Just ditch it - because all the prayers in the world won't make this thing secure. If not, run Flash Update once more... and get ready for the next time... When, why, where and how are you running flash? On Thursday Adobe issued a...
Ready for the right solutions?
It’s time to offload your technology troubles and security stress.
"*" indicates required fields