TechAdvisory.org

Technology Advice for Small Businesses

How to stay safe from Spectre & Meltdown

Like many security flaws, the Spectre and Meltdown bugs can leak critical data from computers and mobile devices for hackers to exploit. What makes them unique is the vast number of PCs, laptops, tablets, and smartphones they affect. But if you use an Apple device, there are fixes that can help you temporarily protect against… Continue reading How to stay safe from Spectre & Meltdown

Spectre & Meltdown safety for Apple devices

Undoubtedly, 2018’s first set of truly bad news involves reports about the Spectre and Meltdown bugs, fundamental flaws in computer processors that can leak highly sensitive data. Researchers say they affect a majority of modern computers, and chances are your business’s devices are also affected. Luckily for Mac, iPhone and iPad users, there are ways… Continue reading Spectre & Meltdown safety for Apple devices

Spectre & Meltdown: how to protect yourself

Spectre and Meltdown are critical security flaws that affect a majority of computers today, including the one you’re using to read this. They can leak your passwords and other sensitive data, which is why software companies are working on security patches. The good news for Apple users is that fixes are now available to keep… Continue reading Spectre & Meltdown: how to protect yourself

Tips to protect your smartphone

Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone or iPhone isn’t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile’s security. Set a strong password Whether your device requires a 4-set… Continue reading Tips to protect your smartphone

Steps to safeguard your mobile devices

Mobile phones are just as prone to cyber attacks as desktop PCs, and cyber scammers are relying on unsecured devices to carry out their deeds. If you haven’t implemented a cyber security guideline for your company’s mobile devices, you can start by following these easy steps. Set a strong password Whether your device requires a… Continue reading Steps to safeguard your mobile devices

Strengthen your smartphone’s security

Hackers aren’t just trying to crack your desktop computers’ passwords, but also your mobile phones’. With cyber criminality running rampant nowadays, it’s become more critical to ensure the safety of all your devices. Let these security tips be your guide. Set a strong password Whether your device requires a 4-set or 6-set numerical PIN, a… Continue reading Strengthen your smartphone’s security

Phishing alert: scammers now use encryption

When you visit an encrypted website, the connection between the source of the web page and your browser is secure. Encryption ensures users’ browsing habits are safe from hackers’ prying eyes, but phishing scammers have found a way to adopt it for their own schemes. How hackers use encryption to carry out phishing scams According… Continue reading Phishing alert: scammers now use encryption

Are the encrypted sites you visit safe?

You can easily tell whether a website is encrypted, and therefore safe, if a padlock icon appears next to its URL and if it starts with HTTPS (instead of just HTTP). Unfortunately, hackers now use the very same tool that’s supposed to protect browsers from malicious entities via encrypted phishing sites. How hackers use encryption… Continue reading Are the encrypted sites you visit safe?

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. How hackers use encryption… Continue reading Phishers use encrypted sites to scam

HP laptop users beware: keylogger found

You might be entering credit card details on a website to purchase something online or filling in your personal information to subscribe to a service, thinking you’re safe behind the keyboard. And you probably are — if the computer you’re using doesn’t have a keylogger installed. But for HP laptop users, chances are they aren’t… Continue reading HP laptop users beware: keylogger found