Safari is one of our all time favorite mobile browsers and in iOS 8 it has gotten even better. You can now use Extensions in Safari, wait what? Yes, extensions. If an app on your device is installed that includes a safari extension you will have the ability to enable it and use it. Several apps…
When you look at the price of some software on the market it’s easy to see why people opt to download certain products using methods such as torrenting. Downloading torrents is a way to download big files and even though it is legal to download certain products, most hackers use torrents to distribute stolen content…
A woman in Toronto has said she managed to buy all the gifts she needed this holiday season without dropping a single dime.
When you were first starting your small business, you knew all along you were going to need a few computers or perhaps even a network to run your systems on. You got all of the basics that you need but never even considered hiring any type of IT staff since your business was small and…
Google has been making unlocking your device much easier, first introducing trusted devices and trusted places allowing you to easily unlock your device if you are at a certain location. Now Google has introduced a new way of unlocking your device called Smart Lock Mode.Lets explain a little more in-depth about what Smart Lock Mode…
In a new report from the WSJ Rhee talks about the adoption rate of its enterprise security solution called "Knox" which it first introduced at MWC 2013. Knox was made to increase the security of Android, something many businesses were worried and complained about, the system lets users easily switch between "work" and "personal", once activated…
Bitcoin ATMs, also known as BTMs, are machines that are used to make transactions with bitcoins. You can buy bitcoins using cash or withdraw cash from selling your bitcoins. The BTM is comprised of a scanner, cash dispenser, and a computer to manage the transactions. Bitcoins are dispensed either to the buyer’s own Bitcoin wallet…
Without a doubt, 2016 has been a contentious year. Sparked by political discord, global health crises and a slew of celebrity deaths — many are eagerly awaiting a fresh start in the new year. But as we all charily know, the long-term effects of an event can sometimes take years to uncover; which is exactly…
No business is safe from cyber-attacks.Even small or newly started companies can be targeted by hackers. Attacks are not always because of the expectation that the hacker can steal cash. The attackers may also not be interested in stealing information or taking critical files hostage. Sometimes, the perpetrators just want to spread malware that damage…
Gone are the days when your parents used to warn you about “strangers you meet on the internet”. Who would ever have thought that these “strangers” your parents warned you about that could hurt you or invade your privacy/life would actually be beneficial to you? This is the case of today’s Sharing Economy.
Sharing…
A woman in Toronto has said she managed to buy all the gifts she needed this holiday season without dropping a single dime.
In the last 24 hours Superfish became the most talked about thing on the internet. It turns out that malware called Superfish Visual Discovery comes pre-installed on several manufacturer's computers and have been for the last 2 years.
the Superfish software was installing its own self-signed Root Certificate Authority so that the Superfish software always appears as…