Articles

Beware of watering hole attacks!

Beware of watering hole attacks!

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack.

Back up your files with Apple Time Machine

Back up your files with Apple Time Machine

There’s a popular belief that Macs are the most reliable computer brand because they are less likely to get viruses or crash often – but they do. And like any other computer, Macs aren’t invulnerable to coffee spills, theft, and crashes. When these happen, the Time Machine is your friend to restore your data.

3 Surprising applications of blockchain

3 Surprising applications of blockchain

Most people associate blockchain technology with Bitcoin, the infamous digital currency that rose to fame in 2017. But blockchain technology is not tied to financial transactions, and it’s creating all sorts of exciting opportunities for faster, more secure information exchange — see for yourself!

What is blockchain?

Blockchain, like the cloud, is more of a concept than a specific piece of software or hardware.

3 ways to ensure your FB data is private

3 ways to ensure your FB data is private

The public went into a frenzy when reports surfaced that Cambridge Analytica, a UK-based data analytics firm, retrieved millions of Facebook users’ private information without their knowledge. But that doesn’t mean you can’t do anything about it, and here are 3 ways to guarantee your data remains private.