Securing Your Passwords and Physical Devices

Part of securing your passwords is understanding how they become compromised. Two of the most frequent ways passwords are compromised is through Brute-Force attacks and data breeches. In a Brute-Force attack, hackers are using a systematic plan to check all possibilities until the correct one is found. If a hacker knows that the site requires…

Read more

Federal Rules of Evidence Have Changed Simplifying the Authentication of Electronic Evidence

In December 2017 an amendment was made to Rule 902 Federal Rules of Evidence, specifically relating to the process for authenticating Electronically Stored Information (ESI).  Until this amendment was passed, now included as subsections 13 and 14, litigants had to have any electronic evidence authenticated through trial testimony.  This was an expensive process.  While our…

Read more

6 Apps Kids Are Using That Parents Need to Know About

Calculator% Looks like a calculator, but don’t be fooled, this and other “calculators” like it are apps used to hide pictures. To access the secret photos in this app you need to type “.” (period) then the 4 digit code setup by the user and another “.” (period”. There is also a paid version of…

Read more

Why Tech Support Scams Are So Prolific

As most people realize the first reason there are so many tech support scams is they are a cash cow for those perpetrating them. The second reason is those who are working to profit off of tech support scams are not just running a single scam website, they are running scams across multiple websites, all…

Read more

Tech Support Scams Are Constantly Adapting

Tech support scammers are always working to create the next great financial windfall for themselves.  These scams can arrive on your screen as fake popups from Apple, Paypal, Microsoft, your Internet Service Provider, basically anything that the scammers think you’ll find believable. In an effort to educate our readers on the variety of ways tech…

Read more
Back to top