by Mike Foster | Mar 23, 2015 | Cyber Security, Cybersecurity, Hackers, Hacking Competition, Pwn2Own
Every year, a major hacking competition called Pwn2Own attracts hackers from around the world to break into computers and programs. This year, hackers earned a total of $442,000 finding holes. Technology companies reward this behavior by paying a bounty, yes, a...
by Mike Foster | Feb 26, 2015 | Best Practices, browser security, Cyber Security, Cybersecurity, Firefox, IT Best Practices, Technology Safety Tips
Open Firefox, click on the little square icon near the top-right of your screen that is composed of three horizontal bars. Then click the question mark for “help”. Third, select “About Firefox.” Firefox will automatically download the latest version. The latest...
by Mike Foster | Feb 20, 2015 | Best Practices, Cyber Security, Cybersecurity, IT Best Practices, IT Settings, Security Breach, Technology Safety Tips
Urgent bulletin: Lenovo pre-installed software called SuperFish on computers that is a security risk. This is just another example of why it is so important to remove the junk-ware from new computers. Follow these instructions from Lenovo:...
by Mike Foster | Feb 16, 2015 | Best Practices, Cyber Security, Cybersecurity, Technology Safety Tips
Especially after the recent Anthem cyber-security breach, people are writing to us who are concerned about identity theft. Below are 5 concise articles, written in plain English, related to identity theft; and you may want to forward this to your friends as well:...