Apple Spectre & Meltdown: how to protect yourself Spectre and Meltdown are critical security flaws that affect a majority of computers today, including the one you’re using to…TruewaterJanuary 23, 2018
Android Tips to protect your smartphone Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone…TruewaterDecember 29, 2017
Security Phishers use encrypted sites to scam Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing…TruewaterDecember 22, 2017
Hardware A keylogger found in HP laptops Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you…TruewaterDecember 20, 2017
Healthcare Key points from Protenus’ new report! In November 2017, healthcare data security and privacy company Protenus released a report on the most common security breaches in…TruewaterDecember 4, 2017
Apple Essential macOS High Sierra updates The macOS 10.13.1 High Sierra update “improves the security, stability, and reliability of your Mac and is recommended for all…TruewaterNovember 17, 2017
Healthcare Watch out! More ransomware attacks incoming Ever since the WannaCry and Petya ransomware outbreaks, healthcare organizations have been on their toes. But just when they thought…TruewaterSeptember 4, 2017
VoIP How to protect your VoIP system from phishing Your business may be well-armed against email-based phishing scams, but you shouldn’t neglect your VoIP (Voice over Internet Protocol) systems.…TruewaterAugust 21, 2017
Security What you need to know about malware You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re…TruewaterJuly 28, 2017
Security Why Nyetya is more threatening than WannaCry The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one…TruewaterJuly 13, 2017