Samsung Galaxy Security Update

According to a researcher in the Security in Communications department at Technical University Berlin, a malicious code circulating the internet could make Samsung Galaxy S2 and S3 phones vulnerable to a flaw, allowing their personal data to be deleted from their device. The researcher showed how the flaw could be exploited using just a single code embedded… Read more »

Microsoft Office Licensing

Yes, we know the world is steadily moving to online office applications like Google Apps or Office 365, but some huge percentage of computer users still need or use Microsoft Office. Here are some licensing tips for business owners:   You cannot use Office Home & Student in any commercial, nonprofit, or revenue-generating activities. Nor… Read more »

Apple Maps Under Fire

One day after going live, the backlash for Apple’s Maps app in iOS 6 is coming on strong and fierce. There’s already a tumblr page showcasing bad map data, warped bridges, cities under water, and other calamities. Forget about finding your local takeout joint. It will be hard enough to finding a city in Scotland through… Read more »

LastPass, UnPwned

This week LastPass announced a partnership with PwnedList, a website which identifies  hacked accounts. PwnedList will make available its continuously updated database so that LastPass users can receive notifications for any username/password combinations that have been compromised. Amber Gott, a LastPass spokesperson, explained how the new service will work: “We do batch checking nightly, against… Read more »

iOS 6 is Here!

iOS 6 is now live. Curious Apple users can update their mobile devices by navigating to Settings>General>Software Update on any iPhone 3GS or later. A list of the features available on the new mobile OS is up on Apple’s site. And for a handy, device specific list you can check out TechCrunch’s chart. Of particular note… Read more »

Internet Explorer or Exploiter?

Earlier this week, tech blogs began urging users to switch to a browser other than Internet Explorer. The reason? Well, several versions of IE (7, 8, and 9) have been found to have a major security flaw. This hole allows hackers to get complete control of vulnerable systems which, according to several forums, are running either Windows XP,… Read more »

Viruses,Trojans, and Rootkits… Oh my!

When it comes to computers, the term used to describe nasty infections is “Malware.” But what exactly is malware? Well, it’s a nebulous term touted by techies, bloggers, and even mainstream media outlets for nearly everything created to harm your system. But that definition is a bit too vague to understand. In an effort to… Read more »

Migrating to Google Apps

Ripple + Ignition A while back, our friends at ignition knew they wanted to improve their email and calendar system. At the time, they had a hybrid of hosted exchange and POP email, which made communication between their people a lot more complicated than it needed to be. After a lengthy discussion between our man… Read more »