Blog

Your mobile phone account could be hijacked by an identity thief

used with permission from FTC Business Center Blog, by Lorrie Cranor, Chief Technologist

A few weeks ago an unknown person walked into a mobile phone store, claimed to be me, asked to upgrade my mobile phones, and walked out with two brand new iPhones assigned to my telephone numbers. My phones immediately stopped receiving calls, and I was left with a large bill and the anxiety and fear of financial injury that spring from identity theft. This post ...

Continue Reading →

How to bookmark in a web browser

If you want to save a webpage, or just “bookmark” it so it’s easier to find later – this is how you do it in three common web browsers!

First step: Go to the website homepage or the specific webpage that you want to bookmark.

Chrome

If you like to use keyboard shortcuts, all you need to bookmark a page is hit Ctrl + D. This shortcut is the default bookmark command in all major web ...

Continue Reading →

The wild world of 3D printing

used with permission from HP Technology at Work

As you may have heard, 3D printers are going beyond the simple plastic creations we’re already familiar with. Way beyond. Scientists, engineers, doctors and creative makers are developing printers for advancements in health care, city planning and space travel. Oh, and now you can print sneakers and pizza, too. Here’s a roundup of the latest and greatest developments in the 3D printing world.

Medical treatments

A variety of ...

Continue Reading →

How a Gmail Password Stealing Scam Works

used with permission from Norton by Symantec

Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to protect yourself from this email password stealing scam.

Who is affected?

Symantec researchers have found this scam largely targets Gmail, Hotmail, and Yahoo Mail users. However, everyone with an email account should be aware of how this scam works to ...

Continue Reading →

What is Grayware, Adware, and Madware?

used with permission from Norton by Symantec, by Nadia Kovacs

If you’re like most Internet users, you’ve never even heard of grayware, adware or madware. That’s because these are all lower on the threat scale in the world of malicious programming. What’s more, they toe the line between legitimate programs and actively harmful applications.

Here’s your quick guide to the new wave of code you don’t want on your computer:

What Is Grayware?

Grayware is a more succinct name for “potentially unwanted ...

Continue Reading →

Critical Vulnerabilities Affecting QuickTime for Windows

used with permission from Norton by Symantec, by Christina Schubert

Two zero-day vulnerabilities showed up recently that could spell trouble for Apple users who use QuickTime for Windows.

The ZDI-16-241 and ZDI-16-242 vulnerabilities allow an attacker to run malware or malicious code remotely. It gains access to a computer when a user is tricked into visiting a malicious webpage or opens a malicious file.

This vulnerability is critical because Apple is no longer providing security updates ...

Continue Reading →

Ransomware on the Rise

Ransomware has been making big news lately. What is ransomware? The crooks scramble (encrypt) your files so you can’t use them, and then demand money to unlock your files. It means your photos are still there, but if you try to view them you can’t, and the same with all your documents and spreadsheets.

There is another variation where the malware locks your PC so you can’t use it until you pay a ransom ...

Continue Reading →

Sneaky Spammer Tactics and How To Avoid Them

used with permission from Norton by Symantec, by Nadia Kovacs

Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive results. Either way, spam tactics come in a variety of shades, and it’s up to users to identify signals early on and avoid unsolicited content.

Here’s a look at some spam tactics used in popular Internet ...

Continue Reading →

How to Give Your Local Business an Online Marketing Tune-up

used with permission from SBA.gov, by Anita Campbell

If you operate a “local business” (meaning one that gets most of its customers from your local area), don’t overlook the Internet as an important way to attract new customers and stay top of mind with existing customers or past customers.

According to Google research, having good online information gets more people to shop in brick-and-mortar stores and businesses.

For local businesses, there are some specific steps to take to make ...

Continue Reading →

Using Publisher’s alignment tools for pixel-perfect document layout

In order to achieve a polished, professional look in Microsoft Publisher, sometimes you need tools that will help you line up and arrange items quickly and crisply. In this tech tip, we’ll show you how to get this done in Publisher.

We’ll start with this layout: onto our page we’ve thrown three images and three text boxes which will be image captions.

We’ve inserted these items quickly, and now we want to efficiently and precisely line them up. We ...

Continue Reading →
Page 2 of 11 12345...»