Blog

Ransomware demands more victims for freedom

Ransomware demands more victims for freedom

Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber security this level of diabolical blackmail represents a new and scary trend for hackers. For more information on how Popcorn […]

How Skype plans to revamp their mobile app

How Skype plans to revamp their mobile app

In a mobile communications space dominated by WhatsApp, iMessage, and Facebook Messenger, the voice and text messaging company, Skype, wants to be much more than just another mobile messaging tool. Earlier this month, they launched their new communication hub named “Skype Mingo” to improve upon the traditional, well-known Skype app. Here are just a few […]

Choosing storage: OneDrive vs SharePoint

Choosing storage: OneDrive vs SharePoint

Digital Storage options with Office 365 provide business owners with convenient and efficient data management. But with new software added daily, it is easy to get overwhelmed by the variety of options. Keep reading to find out which Office 365 program will be your best option for organizing and sharing information: SharePoint or OneDrive. Similarities […]

Microsoft speeds up Windows updates

Microsoft speeds up Windows updates

Windows 10, the latest version of Microsoft’s operating system, has proved to be a system full of many strengths and some very decided weaknesses. One of the biggest flaws of this particular operating system is the fact that Windows Updates are often clunky, take a great deal of time, and use large amounts of processing […]

Predicting cyber-threats in 2017

Predicting cyber-threats in 2017

As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police will spend a lot of time outsmarting each other, while consumers of technology, individuals and businesses alike, anticipate the best security plan that can guarantee they sleep soundly at night. When it comes to defending against cyber-attacks, […]