Blog

New ransomware demands sacrifice

It's scary to think you can be simply browsing the Internet when WHAM! a screen pops up out of nowhere claiming that you have been hijacked and will need to pay a bitcoin to free your computer. Unfortunately, ransomware like this is not uncommon. But now there's a new, more devastating virus that asks victims to pick other victims to replace them in order to get their computer information back safely.

Mingo: Skype’s improved mobile app

In an effort to revamp its somewhat popular mobile app, Skype is launching Skype Mingo. The new version improves upon its predecessor's shortcomings and aims to become an Android user’s ultimate communication tool. Whether or not Skype will succeed is still unclear, but the new app certainly looks promising.

Why HTML5 leads the charge for Chrome

Most people are familiar with the problems associated with loading a Flash-based page, from slower loading times to page crashes that require restarting the browser altogether. Now, Google has announced that its browser will disable Flash and initiate an HTML5 default that will eventually trickle down to every Chrome user.

Best business apps: OneDrive vs SharePoint

SharePoint and OneDrive are similar programs used to help business owners manage and share company data across the board. Choosing which program will best utilize the space and resources you have can be confusing. For a quick overview of these unique programs and how to rationalize the choice for your business, continue reading.

Gooligan virus attacks Android users

If you own an older Android, you might have already experienced the impact of the Gooligan Malware virus. Since August, the infection has struck an estimated 1.3 million Android phones, and it shows no signs of stopping. For those unaware of the Gooligan strain, here are a few key details you need to know right away.

New cyber-threats in 2017 to watch out for

The New Year is upon us, and with it comes a new batch of cyber threats. As advances are made in the world of technology, businesses anticipate changes that can make life more convenient. But, like snakes slithering into your home, cyber attackers also keep up with technological changes for their own nefarious ends.