How a Typo Can Get Your Computer Infected

It is easy to make typos when entering the address to a website in your web browser, and in many cases a typo will not be disastrous.  For example, typing goole.com instead of google.com will lead you to a harmless website about a small town in England.

Unfortunately, hackers are using “typosquatting” as a tactic to infect your computer or steal your information at ever increasing rates.  Malicious entities create fake websites that look like a legitimate site and use a web address that is similar to the original. 

Can I Get a Virus From Just Looking at an Email?

When a computer is infected by a virus or other malicious software the user is often times unaware of how they became infected in the first place.  The conclusion that is drawn up in these cases is the frequently heard "it must have been that email I got earlier today".  Can you get a computer virus just by email?

So, What is the Cloud Exactly?

Buzz words.  Everyone loves to use them, but few seem to know what they mean.  Today, I hope to shed some clarity on one such buzz word for our less buzzy readers.

It is hard, if not impossible, to go a day without hearing some mention of the term "the Cloud".  The word is used by professionals, advertisers, and people in meetings who want to sound smart, but it's exact definition is a mystery to the vast majority of people.  The funny thing is that you probably have experince with the Cloud yourself.  Have you ever use Gmail or Hotmail? If so, then you are a user of the Cloud!

Can an iPad Replace My Laptop?

We've had a few clients asking us lately if they could begin replacing their laptops with iPads and other tablet computers.  The answer is a resounding "no".  Well, not yet at least.  

Morto Virus

Hackers are always looking for ways to infect your machine and force it to do their bidding.  Often times, these Hackers rely on users to have weak passwords and poor security habits to infect computers.  The latest example of this is the Morto Virus which bruteforces users passwords until it guesses the correct one and has access to all your computer files.