One leaked password to a critical account is a tragedy; 1.3 billion may just seem like a statistic. But security expert Troy Hunt's herculean task of combing through a massive roster of stolen logins provides some very practical insights for all of us. What matters is not so much the...
4 Common Ways Windows PCs Get Hacked and How to Stop Them
I've certainly seen my share of malware over the years, and while the methods evolve, our thinking must evolve too. It’s easy to believe the threats are all "advanced," but for everyday Windows users, the majority of compromises still come down to the same few glitches that are recognizable to...
4 Common Tech Mistakes Small Business Owners Make and How to Avoid Them
As a small business owner, you wear many hats—often including that of IT director. With limited time and resources to devote to technology, it’s easy for busy entrepreneurs to make technology errors that can have devastating effects on their business finances, reputation, and productivity. Fortunately, following a few key small...
How to Safely Share a Password While Keeping Your Security Intact
We've all shared a password on a post, or in a text chain, but that can seriously compromise your security. Here's a safer way to do it. You Might Be Leaving a Trail Without NoticingMessages and emails are the worst offenders. Passwords sent through them stay in plain view, on...
Here’s How a Tiny Zip Bomb File Can Devastate Your PC
You might open it by accident. But the moment it starts to unzip, your computer's file system crashes. Except there's no malware in the zip archive, only math. How Compression WorksWhen you compress a file into a ZIP archive, your computer looks for patterns in the 1s and 0s. Repeated...





