Blog

Google releases year-long security study

Google releases year-long security study

Your passwords are the gateway to your files, money, and identity, so it’s no surprise that hackers are constantly trying to steal them. Most cybercriminals will use malware to do the trick, but they also have other means at their disposal. Google’s year-long security investigation provides the details.

No more passwords: Windows 10 knows your face

No more passwords: Windows 10 knows your face

Passwords are slowly becoming a thing of the past. Microsoft’s Windows Hello feature, for example, allows you to unlock your device by simply glancing at the screen. Read on to learn more about this intriguing feature.

Say hello to fingerprint, iris, and facial scans

Windows Hello is an advanced biometric identity and access control feature in Windows 10. With it, there’s no need to enter a password; all it needs is your fingerprint, eye scan, or just your face.

Apple releases KRACK patch in latest OS

Apple releases KRACK patch in latest OS

Almost every macOS update comes with a security patch that users often dismiss. If you’ve read about KRACK, then you should know that updating your Mac’s operating system to macOS 10.13.1 High Sierra is extremely important. Here’s everything you need to know about Apple’s latest Mac OS.

Why you should update now

Foremost on Apple’s list of macOS updates is the addition of 70 new emojis.

Use Google search to schedule appointments

Use Google search to schedule appointments

For most people, Google is the first stop when searching for a specific business. And in some cases — like searches for gyms and beauty salons — people are using Google to help them contact the business about an appointment. Now, the search giant has made that possible right from its results pages.

New Office attack method puts users in danger

New Office attack method puts users in danger

From cloud hacks to malicious macros, hackers are becoming more creative in how they breach Microsoft Office. And although Microsoft releases security patches as soon as vulnerabilities are discovered, there’s a new hacking technique that allows cybercriminals to slip past traditional threat detection tools.

Mobile devices and healthcare businesses

Mobile devices and healthcare businesses

Data security and compliance need to be high on the list of any healthcare organization’s priorities. Do you have security measures in place to protect your patient data? Is your practice compliant with the HIPAA regulation? If you answered “no” to any of these questions, this article is a must-read.