• The word “circumspect” is defined as “wary and unwilling to take risks.”  As a computer user, you should always be circumspect.  However, that is even more true right now especially with email attachments showing Word documents.  Qihoo, a Chinese security company, has revealed a zero-day exploit (Definition: A zero day-exploit is a cyber attack that occurs on the...

    Read more
  •   One would think today was Monday with all that went wrong in the computer world.  I guess it’s encouraging that it’s actually Tuesday but it was still a very rough day.  Here’s what happened:   AOL This morning, customers started to log into our Remote Technical Support (www.4kcc.com/rts) because they could not log...

    Read more
  • FLASH SALE ON COMPUTER TRAINING MARCH 30 & 31, 2017 ONLY! Purchase 1 or more hours of training at 50% off the regular price. * If you live on Florida’s Treasure Coast, the training can be in person in your home. * If you live anywhere else, the training will be via Remote Support...

    Read more
  • So far, we’ve talked about the ways email passwords can be stolen while under your control.  Today, we’re going to address the one way of having your email password taken in which you have zero control – a server hack.  The most recent publicized email server hack was Yahoo.  Yahoo’s servers were hacked and customer’s...

    Read more
  • We’ve been looking at the various ways your email password can be hacked.  Besides being stolen, figured out or given away through social engineering, another method to get your password is for a hacker to successfully answer your security questions.  Probably the most famous incident of this kind happened in 2008, when David Kenell,...

    Read more
Previous Next

In A Word: Circumspect

In A Word: Circumspect

The word “circumspect” is defined as “wary and unwilling to take risks.”  As a computer user, you should always be circumspect.  However, that is even more true right now especially with email attachments showing Word documents.  Qihoo, a Chinese security...

By on Apr 25, 2018

Category: Security

Not A Fun Tuesday

Not A Fun Tuesday

  One would think today was Monday with all that went wrong in the computer world.  I guess it’s encouraging that it’s actually Tuesday but it was still a very rough day.  Here’s what happened:   AOL This morning,...

FLASH SALE ON COMPUTER TRAINING

FLASH SALE ON COMPUTER TRAINING

FLASH SALE ON COMPUTER TRAINING MARCH 30 & 31, 2017 ONLY! Purchase 1 or more hours of training at 50% off the regular price. * If you live on Florida’s Treasure Coast, the training can be in person in...

By on Mar 30, 2017

Category: Training

Email Hack Methods – Server Hack

Email Hack Methods – Server Hack

So far, we’ve talked about the ways email passwords can be stolen while under your control.  Today, we’re going to address the one way of having your email password taken in which you have zero control – a server hack....

By on Jan 17, 2017

Category: Email,Security

Email Hack Methods – Answering Questions

Email Hack Methods – Answering Questions

We’ve been looking at the various ways your email password can be hacked.  Besides being stolen, figured out or given away through social engineering, another method to get your password is for a hacker to successfully answer your security...

By on Jan 17, 2017

Category: Email,Security

Recent Comments

Links

Archive