Tag Archives: Security

Flaw allows thieves to open locked iPads

img-ipad-900px-op1

Have you ever worried about your tablet’s security? If not, you should. Networked gadgets are becoming increasingly interconnected every day, and just one social media account saved on a compromised iPad could lead to breaches on any number of other, more sensitive devices. If you own one of Apple’s popular tablets, you need to know […]

Posted in Apple, General Articles A | Also tagged , , , , | Comments closed

iPads allow thieves to bypass lock feature

img-ipad-900px-op3

Nobody wants to spend the day stressing about dangerous scenarios and “what-ifs,” but in some cases we really must insist. In a recent development, it was discovered that one of the iPad’s anti-theft measures can be easily bypassed with little to no special training. And although no one wants to assume his or her tablet […]

Posted in Apple, General Articles C | Also tagged , , , , | Comments closed

Stolen iPads susceptible to security flaw

img-ipad-900px-op2

There’s nothing worse than hardware vulnerabilities that put even the most cautious of users at risk. We could lecture you about how even unimportant tablets with little to no personal information are still a security liability, but until Apple releases a patch to the iPad’s newest vulnerability, everyone who owns one is at risk of […]

Posted in Apple, General Articles B | Also tagged , , , , | Comments closed

Gooligan malware haunts Android devices

2016december15_android_c_ph

It is the largest single theft of Google accounts ever reported. And if you own an Android 4 or 5 phone, it has likely already affected you. The Gooligan virus, running rampant in third-party app stores, promises to keep wreaking havoc until developers find a way to shut it down. To help your business avoid […]

Posted in Android, General Articles C | Also tagged , , , , , | Comments closed

Gooligan virus attacks Android users

2016december15_android_b_ph

If you own an older Android, you might have already experienced the impact of the Gooligan Malware virus. Since August, the infection has struck an estimated 1.3 million Android phones, and it shows no signs of stopping. For those unaware of the Gooligan strain, here are a few key details you need to know right […]

Posted in Android, General Articles B | Also tagged , , , , , | Comments closed

Gooligan malware wreaks havoc on Android

2016december15_android_a_ph

Google has to contend with yet another malware attack that targets older Android users. Gooligan is a variation of the very successful Ghost Push malware that infected more than four million phones in 2015. This time the point of attack is the Google account. The malware does not attempt to glean info, but rather to […]

Posted in Android, General Articles A | Also tagged , , , , , | Comments closed

Predicting cyber-threats in 2017

hackerscybersecurity-900px-01

As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police will spend a lot of time outsmarting each other, while consumers of technology, individuals and businesses alike, anticipate the best security plan that can guarantee they sleep soundly at night. When it comes to defending against cyber-attacks, […]

Posted in General Articles A, Security | Also tagged , , , , , | Comments closed

New year, new cyber-threats

hackerscybersecurity-900px-03

Have you had to deal with security issues in the past year? Brace yourself, as there are more to come. For this reason, security experts have become indispensable members of society, who guard tech-dependent individuals and businesses against malicious attacks that pose threats to their privacy and livelihood. As you ring in the new year, […]

Posted in General Articles C, Security | Also tagged , , , , , | Comments closed

New cyber-threats in 2017 to watch out for

hackerscybersecurity-900px-02

The New Year is upon us, and with it comes a new batch of cyber threats. As advances are made in the world of technology, businesses anticipate changes that can make life more convenient. But, like snakes slithering into your home, cyber attackers also keep up with technological changes for their own nefarious ends. Knowing […]

Posted in General Articles B, Security | Also tagged , , , , , | Comments closed

Beware of this iPhone-crashing video

2016december2_apple_c_ph

iPhone users should be careful about opening suspicious videos circulating in the web. Recently, a bug in the form of a five-second MP4 clip has been passed around in online forums and video sharing websites. The brief video seems harmless at first, but when iPhone users unwittingly click on the video link, their phones begin […]

Posted in Apple, General Articles C | Also tagged , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.