News You Can Use

Happenings throughout the industry.

Is your Windows license legal? And should you care…

Microsoft has made Windows licensing and activation ridiculously complex. Here's what you need to know.
Click here for full article >>

Lesson: Make sure you update your routers & firewalls or you may be attacked next!

Inside a ransomware incident: How a single mistake left a door open for attackers
Click here for full article >>

Beware of fake crypto wallets for iphone and android:

Cyber criminals are attempting to stealing cryptocurrency from Android and iPhone users by luring them into downloading malicious apps posing as cryptocurrency wallet services. Cybersecurity researchers at ESET have identified over 40 copycat websites designed to look like those of popular cryptocurrency websites, but that actually trick users into downloading fake versions of the apps containing trojan malware.
Click here for full article >>

What is a VPN and how / when do I use it?

Whether you're in an office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. Whether you're in corporate office or home office, on the road or in your home, a VPN is one of the best ways to protect yourself on the internet. How effective are VPNs? What's the best one for you? What are the downsides? Our executive guide will answer all your VPN-related questions -- including a few you probably haven't thought to ask.
Click here for full article >>

What to do if you are not ready to upgrade from Windows 7:

Windows 7 is one of the best things Microsoft ever released. The much-adored operating system wooed back users who reviled the disappointing Windows Vista, and it remained a comfortable refuge during the even bleaker Windows 8 era.
Click here for full article >>

Data Center is hit by Ransomware. Is your data safe ?

CyrusOne, one of the biggest data center providers in the US, has suffered a ransomware attack, ZDNet has learned. CyrusOne is currently working with law enforcement and forensics firms to investigate the attack and is also helping customers restore lost data from backups. The incident took place Dec. 4th and was caused by a version of the REvil (Sodinokibi) ransomware.
Click here for full article >>

Cisco Is Making It More Difficult to Use Pre-Owned Hardware

Without telling their customers, networking hardware manufacturer Cisco has drastically changed the way it sells products. Where once you were able to buy and sell used hardware at your leisure, its new Smart Licensing System—which has rolled out to a majority of Cisco's products—decouple licenses from the hardware in an extremely user-unfriendly way.
Click here for full article >>

Cyberattacks and malware are one of the biggest threats on the internet. Learn about the different types of malware - and how to avoid falling victim to attacks. What is malware? Everything you need to know about viruses, trojans and malicious software.

Malware is shorthand for malicious software. It is software developed by cyber attackers with the intention of gaining access or causing damage to a computer or network, often while the victim remains oblivious to the fact there's been a compromise. A common alternative description of malware is 'computer virus' -- although there are big differences between these types of malicious programs.
Click here for full article >>

A battle is being waged around the country. A grassroots effort is underway to guarantee your right to repair your own electronic device. Electronics repair-related bills have been introduced in legislatures across the country, but it’s still too early to know where – or if – they’ll gain traction.

Right-to-repair legislation has been introduced or is being drafted in 16 states this year: Hawaii, Illinois, Indiana, Massachusetts, Minnesota, Montana, Nevada, New Hampshire, New Jersey, New York, North Dakota, Oregon, South Dakota, Virginia, Washington and West Virginia.
Click here for full article >>

Man discovers his 30 year old Apple IIe still works! But his kids have no idea what floppy drives are.
A New York professor has Gen Xers reminiscing about their childhood after he posted images of his decades old Apple lle computer on Twitter Saturday night.

John Pfaff dusted off the old computer that has been sitting in his parent's attic for decades, and to his surprise it still turned on.
Click here for full article >>

These Android apps continue to track users even after they say stop.
Some apps may track your activity over time, even when you tell them to forget the past. And there's nothing you can do about it. Roughly 17,000 Android apps collect identifying information that creates a permanent record of the activity on your device, according to research from the International Computer Science Institute that was shared with CNET. The data collection appears to violate the search giant's policy on collecting data that can be used to target users for advertising in most cases, the researchers said.
Click here for full article >>


38281 Schoolcraft Rd.
Suite B
Livonia, MI 48150


Phone: 734.261.0730