p

News

Credential Stuffing Scam Causes Data Leak!

Credential Stuffing Scam Causes Data Leak!

An operator at a free, public hosting service sent an unencrypted database with almost 42 million email address, passwords and partial credit cards to 'HaveIBeenPwned', causing a breach of this data. They have not been able to trace the company or the operator yet...

read more
Has Your Browser Been Hijacked?

Has Your Browser Been Hijacked?

Hackers have been hijacking browsers for a long time!  They do this to change your home page, making it redirect you to their server.  After that, they can make you see pop up ads, track your movements online, or even put a keylogger on your browser and steal your...

read more
Phishing Scams Behind Most Cyber Attacks!

Phishing Scams Behind Most Cyber Attacks!

Recent studies have shown that phishing scams, more specifically spear phishing, are the most successful cybercrimes! Hackers love the simplicity of these attacks and their effectiveness is unrivaled!  They have been used around the world with devastating results. ...

read more
For Apple Lovers!

For Apple Lovers!

On September 12th Apple revealed the newest Apple products and the upgrades to come this year! This includes: MacOs upgrade from High Sierra to Mojave New Security updates to the Safari web browser New iOS for your iPad and iPhones Password reminders to let you know...

read more
Protect Your Phone From CryptoJackers!

Protect Your Phone From CryptoJackers!

We did a blog on computer Cryptojacking in June, now hackers have focused on phones. BitCoin mining is difficult to do and uses a lot of power. Cryptojackers are sneaking apps into phones thru websites with JavaScript. Once the apps are on your phone they work in the...

read more
Newest iPhone Release!

Newest iPhone Release!

Do you have a problem with your iPhone 8?  There was a serious flaw that randomly restarts the phone, freezes the screen or just causes the phone not to start! Apple has acknowledged this flaw and found the flaw to be due to a ‘faulty logic board’ in the phone.  If...

read more
What to do After Your Information was Breached

What to do After Your Information was Breached

The hardest thing about a breach is dealing with the aftermath.  What do you do? Tips for AFTER a breach: 1:  Find out if how much of your information was breached.  Was it your username and password?  Your social security number? Your personal information? What...

read more
Spam Email is Evolving

Spam Email is Evolving

Spam used to be easily recognized by your spam filter.  You didn’t have to think about opening your emails, or questioning the authenticity of them. Hackers are getting smarter and finding ways around spam filters. The typical scam warning signs are changing.  No...

read more

Get Started On Your Service

Contact us if you have any questions about repair or upgrades, or just stop on in to one of our stores… no appointment necessary!

Contact Us Now