Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber security this level of diabolical blackmail represents a new and scary trend for hackers. For more information on how Popcorn […]
Ransomware demands more victims for freedom
AWS to launch “Glue” service
Many businesses and enterprises have long struggled with the drudgery and difficulty that is data analysis — especially data analysis in a cloud-based system. AWS (Amazon Web Services) may have just the solution to that problem. A new app, known as “Glue,” offers the opportunity for businesses to clean up data to help analytics run […]
Solution to eliminate iCloud calendar spam
Over the last month, users have reported spam issues plaguing their iCloud calendar. Fortunately, Apple has come up with a solution. One of its new features allows users to report and remove spam from their calendar. Hopefully this small step takes care of the problem once and for all. From what started the whole mess […]
Containers Vs. VMs: performance variations
Virtual containers have incrementally increased the ability of users to create portable, self-contained kernels of information and applications since the technology first appeared in the early 2000s. Now, containers are one of the biggest data trends of the decade — some say at the expense of the virtual machine (VM) technology that preceded them. Read […]
Choosing storage: OneDrive vs SharePoint
Digital Storage options with Office 365 provide business owners with convenient and efficient data management. But with new software added daily, it is easy to get overwhelmed by the variety of options. Keep reading to find out which Office 365 program will be your best option for organizing and sharing information: SharePoint or OneDrive. Similarities […]
Gooligan malware wreaks havoc on Android
Google has to contend with yet another malware attack that targets older Android users. Gooligan is a variation of the very successful Ghost Push malware that infected more than four million phones in 2015. This time the point of attack is the Google account. The malware does not attempt to glean info, but rather to […]
Predicting cyber-threats in 2017
As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police will spend a lot of time outsmarting each other, while consumers of technology, individuals and businesses alike, anticipate the best security plan that can guarantee they sleep soundly at night. When it comes to defending against cyber-attacks, […]
5 tips to turn Instagram followers into buyers
Did you know that your thousands of Instagram followers are a goldmine for potential sales? Yes, they are, but you can’t make the most of this goldmine by simply switching your posts’ filters from Clarendon to Valencia on a regular basis. Turning your Instagram followers into customers requires more than just a finely curated set […]
Using automation in SMB marketing
One of the biggest innovations in business and technology is marketing automation. Previously reserved for well-funded enterprises, marketing automation is now accessible to small businesses, thanks to affordable cloud solutions. In fact, there are five explosively profitable benefits to automating some of your most mundane tasks. Check them out here. Instant responses to email requests […]
iPhone video bug crashes Apple devices
Apple iOS users beware — there’s a five-second video that can harm your iPhone. In late November, the brief MP4 clip seemed innocent enough. But after iPhone users played the video, their iPhones began to slow down and eventually crash. Details of the iPhone-killing bug are still being investigated, but here’s what we know so […]