A new ransomware called “Locky” is circulating via email. It comes in as a message with an invoice.doc attachment. If you open the attachment and don’t block macros from temporary (more…)
Anything. Anywhere. Anytime. More or less.
Cloud computing is Internet-based computing on an as-needed basis and on-demand. It’s a way of accessing your software, your data, your music, movies, and even your relationships, through the web — and not just accessing, but interacting, creating, managing. Instead of being in your home or office, the computers that hold your files, music, movies, operating system, and programs can be stored and maintained in huge data centers around the world. (more…)
Actually, it’s a Trojan, not a worm, but a Trojan in an apple doesn’t have the same ick factor. Or, maybe it does. Anywaaay, scores of Mac computers have been infected by a trojan called Mac Defender which masquerades as an antivirus program. It enters computers through coding embedded in some image search results. (more…)
If I had a dime for every time a client accidentally deleted a file . . . Well, I actually do have a dime for every time a client did that. It’s incredibly stressful to think you’ve lost valuable data, special photos or essential emails. (more…)