Tuesday, August 31, 2010

Gmail getting a smarter Inbox feature

Google's new Priority Inbox feature not only sorts your inbox, but it also figures out what's important based on what messages you reply to and read.

Monday, August 30, 2010

Five simple steps for Computing on the Road

So whether you are a small business, about to embark on the holiday of a lifetime, a short break or six months backpacking around the world, then make sure you follow these five simple steps.

Thursday, August 26, 2010

Un-Hide Friends from your Facebook feed

If you have hidden a friend from you Facebook feed and want to see them again just follow the steps below.

Wednesday, August 25, 2010

The 2 Biggest Security Threats: ScareWare & You

Without a doubt the largest threat to the security of your computer and consequently your identity, and bank account is YOU, followed closely by ScareWare. The best firewalls and most effective antivirus won't help a bit if you, the user, click on Rogue Security Software and fake warnings. Known also as Scareware, this thief is fooling you big time. When it knocks, do not open the door.

Tuesday, August 24, 2010

How can I know if my computer is infected?

Users are often advised to use an antivirus to check if their systems are infected, but with the current cyber-crime scenario, this is simply not enough.While many of today’s threats are designed specifically to go undetected, there are still some tell-tale signs that a system has been compromised.

Monday, August 23, 2010

9 Dangerous Things You Can Do Online

Below are 9 potentially dangerous things, and what you can to do to make doing them safer.

Friday, August 20, 2010

Spam/Phishing Spreads Through Facebook Chat, Events & Messages

Recently, a new wave of spam messages, chat messages, and events requests have been flooding the site, and the volume has only surged in the past few days.

How to: Properly Coil Your MacBook's Power Cord

Apple's white power brick is pretty handy, what with the attached hooks for coiling it up and packing it away. If you do it wrong, though, you'll likely stress the cord and break it (or worse, create a fire hazard).

Thursday, August 19, 2010

How to Tag People in Your Facebook Status Updates

This was quite a big deal when it was announced this past September, but from the amount of searches on the topic “how can I make someone’s name go blue in a Facebook status?” it seems some people still have not found the answer.

Wednesday, August 18, 2010

Facebook has enhanced its auto-suggest and tagging

Facebook has enhanced its auto-suggest and tagging feature so that the @ key is no longer required.

"Funny T-Shirt Fails" scam costs victims a $5 weekly charge

Facebook users came under attack from a new clickjacking scam that could result in lost money as well as aggravation, spread by the social networking site's Share button. The scam culminates with a list of surveys, similar to those used in a 'Dislike' button clickware scam discovered earlier this week and a Like button scam uncovered in June, according to anti-virus developer Sophos, which uncovered the con.

Your Photos Can Your Reveal Secrets

You can easily find out where people live, what kind of things they have in their house and also when they are going to be away.

Tuesday, August 17, 2010

Wireshark Antivirus - Rogue Badware

Wireshark Antivirus is a fake anti-malware application. These so-called "rogues" use intentional false positives to convince users that their systems have been compromised. Then they try to sell you their software, claiming it will remove these threats. In extreme cases the false threats are actually the very trojans that advertise or even directly install the rogue.

All indigoGUARD clients: The application has been added to your block list.

If you think you have been infected please contact us. CALL 358-6305

New Facebook Attack via IM mentioning a cartoon.

A spam attack that is sent as an IM on Facebook, mentioning a cartoon that had been created.

Is Your Copier A Security Threat? Other network Devices?

Any device attached to your network poses potential risks, in terms of stuff on the network, computers -- desktops, notebooks, and servers -- tend to get the lion's share of press as tempting cyberattack targets, along with unsecured web sites, gullible/careless users, CD/DVD-ROMs, USB flash drives, PDF files, smartphones, VoIP PBXs and a few other things, not all of which, to be sure.

Monday, August 16, 2010

New Facebook Dislike Button Is A Scam

Scammers are becoming pretty clever with a Facebook application which claims to enable a dislike button.

How to Protect Your Phone's Valuable Data

The loss of a smartphone wouldn't be so bad if it ended with merely a bit of embarrassment. Since many people now use smartphones for online banking, travel reservations, and storing sensitive business documents, however, a great deal of very private data ends up on the device.

Friday, August 13, 2010

Searching for "Virus Removal" Tools Can Lead to an Even Worse Outcome

Many people tend to trust well known companies such as Google and Yahoo, but sometimes these search companies serve up some troubling links in their search results. There are many people who use these search sites to find out information about how to remove viruses, etc., but if a user types in “Security Tool Removal,” they are served up dangerous links that go to malicious websites. These websites can create even more of a security risk without the user even knowing.

Thursday, August 12, 2010

Free Wi-Fi – Worth the risk?

Wi-Fi has become virtually a staple in our technologically-enhanced lives. Its convenience increases productivity in countless industries, academics and even the family home. Retail establishments such as Panera Bread, McDonald’s and Barnes & Noble offer free Wi-Fi in their stores as an amenity to get customers to browse and buy their products. While “free Wi-Fi” might seem like a no-brainer, customers should keep in mind the inherent risks of free Wi-Fi.

Wednesday, August 11, 2010

32-bit vs. 64-bit Computing?

Sixty four bit, has been around since the beginning of computing, but it wasn't in the mainstream marketplace until just a few years ago.  You've probably seen that Windows® 7 comes in 32 and 64-bit version and wondered what the difference is.  Trying not to get too technical, we will explain the difference.

Tuesday, August 10, 2010

College Tech Survival 101

It’s that time of the year again! Whether you’re a returning college student or a newbie freshman in the funky and crazy lifestyle called higher learning, we have some tips and tricks that can help you cash-strapped college students make the best of your academic experience.

Monday, August 9, 2010

Ways to Block Pop Ups

Pop ups and other intrusive types of advertising are now used to thrust an ad in your face that you have no choice but to at least acknowledge. Regardless of the nature of the ad, pop ups are a nuisance, and there are now many options available for keeping them off of your computer screen all together.