Blog

Windows 8.1 bug Allows Administrator Access

Windows 8.1 bug Allows Administrator Access

Google publicly disclosed a Windows 8.1 bug that allows administrator access to PCs. The disclosure highlight a vulnerability affecting millions of users. This has left Microsoft outraged, especially considering that they were about to release a patch for it. The news...

What is Google Fiber?

What is Google Fiber?

Google Fiber is a new Gigabit Internet provider that could be coming to your area. What is Google Fiber and what should you know to be ready? Will Google have to step on anyone's toes to roll out such service and what impact can Google Fiber have on businesses and...

Spreading Viruses on USB Thumb Drives

Spreading Viruses on USB Thumb Drives

To stay safe from infections, we’re going to look at how viruses spread over USB thumb drives and how you can protect yourself and your business. Why would anyone deny the comfort level enjoyed with using USB thumb drives to conveniently transfer data? Beneath it all,...

Know Everything About Your System with Speccy

Know Everything About Your System with Speccy

Speccy is free software that provides a very detailed view of your computers hardware and software in a easy to understand, user friendly environment. Speccy lists and provides very crucial and accurate specifications of your computer hardware and software. If you...

What is Remote Code Execution?

What is Remote Code Execution?

Why do hackers use remote code execution as a malicious attack on businesses? Here we'll explain what remote code execution is and why most malware uses it. Remote execution attacks are very real and should not be taken lightly. This is mainly due to the damage which...

Timeline of Sony Cyber Attack

Timeline of Sony Cyber Attack

The Sony data breach in late 2014 has caused embarrassment towards their own top executives and employees. Here is a timeline of the Sony hacking events. Here’s the timeline of the 2014 Sony Pictures Cyber-attacks: November 24 Early morning at Sony Pictures...

Sony Under Attack: The Wiper Malware

Sony Under Attack: The Wiper Malware

The sophisticated Wiper malware which was launched against Sony Pictures does exactly what it sounds like: wipes anything and everything from systems. "Wiper" uses a malicious set of attacks: [rockthemes_list font_awesome_icon_class="fa-gear" icon_color="DodgerBlue"]...

5 Ways to Spend Your IT Budget

5 Ways to Spend Your IT Budget

It's that time of the year again. The fiscal year is drawing to a close and you still have money left to spend. Here are 5 ways to tie up IT loose ends. Why spend your remaining IT budget? In practical terms, we’re looking at productive suggestions in ways that you...