by The Same Day Computer Team | May 1, 2018 | Blog, Front Page, News, Services, Uncategorized, What We Do
On most days this wouldn’t be newsworthy, however, Gmail is making a few new additions to their email system that may interest those that send sensitive information via email! The sender will be able to require a password to open the email, which Gmail will generate. ...
by The Same Day Computer Team | Apr 30, 2018 | Blog, Front Page, Uncategorized
Bad news seems to surround Facebook, lately! We recently blogged about the leaks with Data Analytica and your account information. Now it seems that you don’t even have to be ON Facebook to have a ‘shadow’ account with them! What does this mean? A ‘shadow’ account...
by The Same Day Computer Team | Apr 26, 2018 | Blog, Front Page, News, Uncategorized
There has been a lot in the news lately about the data leak involving Facebook and Cambridge Analytica. The data leaked includes names, email address, profile, friends list, and what is liked or shared. It all started with “This is Your Digital Life” quizzes. You...
by The Same Day Computer Team | Apr 25, 2018 | Blog, Front Page, News, Uncategorized
A few months ago, Facebook came out with a VPN service named Onavo. On the surface this is a good thing. What is a VPN? And how does it work? A VPN, or virtual Private Network, links you to the internet with a secure connection that hides your tracks and keep your...
by The Same Day Computer Team | Apr 11, 2018 | Blog, Front Page, News, Services, Uncategorized, What We Do
It’s not just computers that hackers are getting into – they are targeting tablets and phones as well. How can you tell if you device is infected? 1: Excessive Data Usage – beyond the usages that is normal for you. 2: Applications crash for no reason. 3: Extra...
by The Same Day Computer Team | Apr 10, 2018 | Blog, Front Page, News, Services, Uncategorized, What We Do
Researchers have found that Cortana is listening for voice commands even when your computer is asleep! This flaw can allow hackers to make commands too. How it works: The good news is that in order for a hacker to start using Cortana, they have to physically connect...