Mike Foster's IT Security & Best Practices Blog

Latest Posts

The Google Scam Shows How, If someone You Know Gets Hacked, it can Make You Look Bad Too.

The Google scam: If anyone receives an email that contains a link to Google Doc, do not click on the link. Even if the email appears to be from someone they know and trust. Google did not get hacked, but someone else who has your email address in their contact list probably did. Anyone who […]

Continue reading The Google Scam Shows How, If someone You Know Gets Hacked, it can Make You Look Bad Too.


1 Million Android User Accounts Reported Hacked

It was reported yesterday that malicious apps running on Android phones has resulted in 1 million Google user accounts being hacked. Check Point Software Technologies estimates that 75% of Android phones are still vulnerable to this attack. Once the attackers take over the phone, they can then gain access to the user’s Google accounts. Often […]

Continue reading 1 Million Android User Accounts Reported Hacked


Attackers Can Hack Your Phone Without Having Your Phone

Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from your phone can be as simple as gaining access to that data in the cloud. Additionally,

Continue reading Attackers Can Hack Your Phone Without Having Your Phone


Why is it not Google’s fault?

After last week’s post about the stolen Google and Gmail passwords, one of our valued subscribers wrote back asking why it isn’t Google’s fault that the passwords were stolen.

Continue reading Why is it not Google’s fault?


No Flash Attacks After June 30

Starting June 30, 2016, Google will no longer accept advertisements that use Flash. What this means: Better security for you and your organization. You needn’t buy anything or change anything. It will all happen automatically.

Continue reading No Flash Attacks After June 30