Tag Archives: Cyber security

Spectre & Meltdown safety for Apple devices

Undoubtedly, 2018’s first set of truly bad news involves reports about the Spectre and Meltdown bugs, fundamental flaws in computer processors that can leak highly sensitive data. Researchers say they affect a majority of modern computers, and chances are your business’s devices are also affected. Luckily for Mac, iPhone and iPad users, there are ways […]

Posted in Apple, General Articles C | Also tagged , , , , , | Comments closed

How to stay safe from Spectre & Meltdown

Like many security flaws, the Spectre and Meltdown bugs can leak critical data from computers and mobile devices for hackers to exploit. What makes them unique is the vast number of PCs, laptops, tablets, and smartphones they affect. But if you use an Apple device, there are fixes that can help you temporarily protect against […]

Posted in Apple, General Articles B | Also tagged , , , , , | Comments closed

Spectre & Meltdown: how to protect yourself

Spectre and Meltdown are critical security flaws that affect a majority of computers today, including the one you’re using to read this. They can leak your passwords and other sensitive data, which is why software companies are working on security patches. The good news for Apple users is that fixes are now available to keep […]

Posted in Apple, General Articles A | Also tagged , , , , , | Comments closed

Tips to protect your smartphone

Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone or iPhone isn’t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile’s security. Set a strong password Whether your device requires a 4-set […]

Posted in Android, General Articles A | Also tagged , , , , | Comments closed

Steps to safeguard your mobile devices

Mobile phones are just as prone to cyber attacks as desktop PCs, and cyber scammers are relying on unsecured devices to carry out their deeds. If you haven’t implemented a cyber security guideline for your company’s mobile devices, you can start by following these easy steps. Set a strong password Whether your device requires a […]

Posted in Android, General Articles C | Also tagged , , , , | Comments closed

Strengthen your smartphone’s security

Hackers aren’t just trying to crack your desktop computers’ passwords, but also your mobile phones’. With cyber criminality running rampant nowadays, it’s become more critical to ensure the safety of all your devices. Let these security tips be your guide. Set a strong password Whether your device requires a 4-set or 6-set numerical PIN, a […]

Posted in Android, General Articles B | Also tagged , , , , | Comments closed

Phishing alert: scammers now use encryption

When you visit an encrypted website, the connection between the source of the web page and your browser is secure. Encryption ensures users’ browsing habits are safe from hackers’ prying eyes, but phishing scammers have found a way to adopt it for their own schemes. How hackers use encryption to carry out phishing scams According […]

Posted in General Articles C, Security | Also tagged , , , | Comments closed

Are the encrypted sites you visit safe?

You can easily tell whether a website is encrypted, and therefore safe, if a padlock icon appears next to its URL and if it starts with HTTPS (instead of just HTTP). Unfortunately, hackers now use the very same tool that’s supposed to protect browsers from malicious entities via encrypted phishing sites. How hackers use encryption […]

Posted in General Articles B, Security | Also tagged , , , | Comments closed

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. How hackers use encryption […]

Posted in General Articles A, Security | Also tagged , , , | Comments closed

HP laptop users beware: keylogger found

You might be entering credit card details on a website to purchase something online or filling in your personal information to subscribe to a service, thinking you’re safe behind the keyboard. And you probably are — if the computer you’re using doesn’t have a keylogger installed. But for HP laptop users, chances are they aren’t […]

Posted in General Articles C, Hardware | Also tagged , , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.