Passwords, Passkeys, Password Managers, and 2FA

Let's discuss passwords, passkeys, password managers, and 2FA. Why this subject? For one reason, a hacker recently attempted to break into my website. For another reason, hackers are always looking for vulnerable email accounts and financial accounts. The last thing I want to see is for your email and other accounts to be compromised. Why …

Continue reading Passwords, Passkeys, Password Managers, and 2FA

Five Important Videos You Need To Watch

I want to share five important videos from our YouTube Channel. I realize this post will sound self-promoting but I promise you, it's based on what we are seeing in Remote and hearing over the phone. Why Do I Have A YouTube Channel? There are a number of reasons I have a YouTube Channel. At …

Continue reading Five Important Videos You Need To Watch

Fifteen Computing-Related Rules You Should Follow

I want to review fifteen computing-related rules you should follow. If you've been a customer of ours for a long time, most of these should sound familiar. The same is true if you've been a blog subscriber for a while. Unfortunately, we see people all the time in Remote Technical Support who aren't following some …

Continue reading Fifteen Computing-Related Rules You Should Follow

Android Users Should Do This

Seriously, Android users should do this: make sure anti-virus/anti-malware is installed. Why It's Important If you use an Android tablet or smartphone, you need to make sure you have software installed to protect your device. Last week, it was reported that over 300,000 Android devices were infected. A fake banking app was the cause of …

Continue reading Android Users Should Do This

How Tooltips Are Being Used For Phishing

It's important that you understand how tooltips are being used for phishing. First, I'll explain terms and then I'll outline the phishing process being used. Definitions Tooltips Are you familiar with the term tooltip? You probably see them all the time when you use a computing device but you might not know the term. Let's …

Continue reading How Tooltips Are Being Used For Phishing

Windows 11 And Malware – Fake Downloads

Scam Virus Spyware Malware Antivirus Concept I want to warn you about Windows 11 and malware. As you know from reading my post, "Windows 11: Developer's Edition," Windows 11 is available for testing. In fact, maybe you've even watched my YouTube video titled "Windows 11." But there's a problem. Fake Downloads It's unfortunate but it's …

Continue reading Windows 11 And Malware – Fake Downloads

What Is The Cookie Pop-up I Keep Seeing On Websites? GDPR Cookie Consent?

What are those pop-ups you're seeing on a lot of sites, including ours, that ask you to accept cookies? (If you click on either of the two pictures above, you'll see larger images so that you can make out what each image has in text.) The messages have to do with General Data Protection Regulation …

Continue reading What Is The Cookie Pop-up I Keep Seeing On Websites? GDPR Cookie Consent?

There’s More Than Meets The Eye…The Dark Web

Yesterday, I attended a very enlightening webinar regarding the dark web. The four moderators shared information about what can be found there. They defined terms, such as "market place" and "forum," as those terms related to this shady area of the Internet. The webinar was geared towards both businesses and consumers. I was struck by …

Continue reading There’s More Than Meets The Eye…The Dark Web

I Have To Share Bad News With You-Email Scam

"I have to share bad news with you" is actually the first sentence from the email pictured above. (You can click on the image to see a larger, more readable version.) Lately, I've been getting about six of these a day. So far, we've had one customer log in to Remote Technical Support because they …

Continue reading I Have To Share Bad News With You-Email Scam

Ignore Microsoft and Google

In my recent post, "Delete Now!," I explained through verbiage and a video the importance of NOT saving passwords in your browsers. I based my narrative on my own experiences; those opinions of well-known hackers and cybersecurity analysists; and the NZ Bankers Association which said in a post: "A common mistake that users make is …

Continue reading Ignore Microsoft and Google