Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack.
There’s a good reason why businesses like Office 365: It’s a feature-rich productivity suite that gets plenty of upgrades throughout the year. Last month, Microsoft announced four new upgrades that will make the cloud platform even more irresistible for small- and medium-sized businesses.
Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier this month, Microsoft has released a security update for Windows XP, an operating system that has been unsupported since 2014. Although releasing a patch for an old system seems unusual, Microsoft does have its reasons.
Hospitals and healthcare organizations are usually the first victims of malware attacks. WannaCry ransomware — malicious software that encrypts files until the victim decides to pay the Bitcoin ransom — took advantage of this when it hit several healthcare institutions last month.
In the past year, Microsoft was heavily criticized for forcing the Windows 10 OS update on PC users. After thousands of customer complaints, the tech giant vowed to make changes and appease disgruntled end users. With the new year are signs that the firm is finally tending to these problems. Here are some of them: […]
As far as communication goes, there are numerous factors to consider, especially when that communication is done online rather than in person. Since its inception, Microsoft Outlook has always been an excellent communication tool. And now, with its recent update, it can do an even better job at helping people communicate with one another quickly […]
It’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like […]
For a long stretch of time, the relationship between Apple’s iPhone and Microsoft’s Office suite wasn’t great. The screen was too cramped for efficient document-creation and the processors were too slow to support the multitude of functions. Fast forward to present day, and those grievances have mostly been taken care of. What iPhone owners are […]
Non-techie Apple iPhone lovers relish in the magic hour ensuing a beta’s release. Those of us in the industry break down every minute detail and flock to our digital soapboxes to proclaim what we usually deem apocalyptic news. The sun is setting on Apple’s iOS 10 magic hour, and we’re here to pass judgement for […]
On March 22, Apple rolled out iOS 9.3. While many iPhone users are likely to have already upgraded to the new iOS, there are undoubtedly some who have yet to update. Regardless, there are some tried and true methods to ensure a successful update to your iOS, whether it be to this version or a […]