Yes, you read that title right. If your WiFi isn't protected, you can be hacked by the furry little creature that wanders around your backyard when you're not home. Coco, a Siamese cat from Washington, D.C., was able to discover dozens of weak or unprotected WiFi networks in his neighborhood with his high-tech collar.
Business Solutions & Software Group Blog
Of all the computer company rivalries going on, one of the largest and most well known is Apple vs. Microsoft. The storied competition between these two software giants has driven innovation forward for more than thirty years. Today, the frontlines of this battle take place between the two company's mobile divisions, and now there's a third major competitor in the mix.
Your office is likely full-to-bursting with devices utilizing USB technology. It's been a popular way to connect external devices to PCs since the 1.1 version was released in 1998. However, it may be the technology's popularity that will cause its downfall as hackers develop ways to use the device to their advantage.
While desktop virtualization isn't a new thing, it is one that has been increasing in popularity for businesses over the past few years. It offers a lot more freedom with particular aspects of managing your technology, including increased reliability and security. While the physical problems of a desktop are taken care of, you'll also have the benefits of being protected from a sudden crash or wearing from old age.
All of the recent vulnerabilities and bugs over the past few months, such as Heartbleed, GameOver Zeus, and the zero-day Internet Explorer vulnerability have many people thinking - just how strong is antivirus in the face of such threats? Symantec told The Wall Street Journal their opinion on the subject: Antivirus is "dead."
Latest News
Our Site Has Launched!
Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Business Solutions & Software Group!