Security Ready for tax season phishing scams? As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting…TruewaterMarch 29, 2018
Web & Cloud The importance of HTTPS Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS,…TruewaterMarch 7, 2018
Security Google studies effects of leaked logins Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to…TruewaterNovember 21, 2017
Apple Old Mac malware gets a facelift In yet another sign that Apple computers are no longer being ignored by hackers, a successful piece of Windows-based malware…TruewaterJuly 27, 2017
Google Google adds anti-phishing features on Gmail Cybercriminals have been relentless throughout 2017. In the past couple of months, hackers discovered new malware strains and software vulnerabilities…TruewaterJune 19, 2017
Security WannaCry: A historic cyberattack No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years,…TruewaterMay 25, 2017
Android New phishing protection for Gmail on Android One of the most common ways hackers infiltrate networks is by using phishing scams -- fraudulent emails to trick unwitting…TruewaterMay 18, 2017
Security The most advanced Gmail phishing scam yet As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly…TruewaterMay 10, 2017
Office Microsoft Word bug: What you need to know Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to…TruewaterApril 26, 2017
Security The phishing craze that’s blindsiding users Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing…TruewaterApril 24, 2017