Cyber Security Basics - Part 1
Living in an increasingly technologically augmented world, where online scamming techniques, are more ubiquitous than cute cat videos on...
Microsoft releases new preview build for Windows Server
Microsoft had just released the first early build of the next version of Windows Server. It is accessible to participants in the...
DoNotPay - Helps you beat the system with free legal advice
A small startup from UK,had developed a virtual "lawyer", that can efficiently and most importantly - free of any legal fees, help you...
Google to join Net Neutrality initiative
Google will take part in the "Network Neutral Action Day" event, which will take place this Wednesday, the company said in a statement....
Get the most out of your Office 365
Declutter your inbox If you’re having trouble managing the overwhelming amount of emails in your inbox, then using Office 365’s...
Data loss prevention tips for Office 365
Microsoft understands the value of your business’s data and the costly repercussions of losing it. That’s why they’ve released a slew of...
This Phishing Attack is Almost Impossible to Detect On Chrome, Firefox and Opera
A Chinese infosec researcher has reported about an "almost impossible to detect" phishing attack that can be used to trick even the most...
Managed services and Cyber Security
You probably hear a lot about Cyber Security these days. While sometime the term is thrown around to scare business owners, other times...
Understanding Updates and the importance of Patch management
At one point or another you have been prompted to install the latest update for Flash, Java and let’s not forget Windows updates. In the...
A bold prediction: Passwords to be obsolete within 5 years
Passwords are still the preferred authentication method despite of it's numerous deficiencies. Although two-factor authentication, iris...