Blog

Ready, set, update: iOS 10 release scheduled

Although they may not garner the fervor of hardware releases and refreshes, iOS updates still manage to bring even the most casual of iPhone and iPad users out of the woodwork. Those who were willing to brave the bugs of Apple’s beta got a chance to play with the most recent version of the mobile platform, but the rest of us have been patiently awaiting its release.

The top 9 updates from Android Nougat

When an archaeologist discovers relics of a long-forgotten dynasty, mixed emotions ensue. The thrill of stumbling upon something untouched intertwines with a slight dread of working with something you know nothing about. The same notion is applicable to smartphones, in particular, operating system updates.

Are your VMware machines up to date?

Until now, virtualization hadn’t been targeted by cyber attackers with the same vigor as other small- and medium-sized business IT solutions. Whether it was because of the inherent security of virtualization or because of the relatively narrow scope of its adoption, this is no longer the case.

BEC: The Threat of Sophisticated Attacks

Hacking into “secure”, corporate email systems has recently become a lucrative business. To date, business email systems that have been compromised have caused companies worldwide to lose over 2 billion dollars. Due to the success of these scams, that number only continues to rise.

How To Stop Ransomware Before It Strikes

Ransomware is a type of malware (like a virus) that blocks access to a computer system or even an entire network unless you pay a sum of money to the malware’s author. Here are PalmTech’s top tips for foiling these extortionists before they strike:

Reassess Your Current Antivirus Protection and Next-Generation Security Layers for Maximum Protection.

Ransomware appears as fake Windows Update

Unlike those who attend Hogwarts, magicians rely mainly on subtle sleight of hand to convince others that they managed to make coins disappear into thin air. The same concept applies to ransomware. How can it complete its mission in a suit labeled with the word “Villain”? Nowadays, ransomware fashions various disguises that render it undetectable.

Google’s cloud services are now beta-free

As the saying goes, “Good things come to those who wait.” Much like bakers who patiently wait for their souffle to rise, or artists who carefully tend to their masterpieces with meticulous brushstrokes, small- and medium-sized business owners also eagerly await the latest cloud database service to shed its beta status.

Change your Dropbox password

In 2012, cloud storage firm Dropbox was hacked with over two-thirds of its users’ details dumped all over the internet. While the company initially thought a collection of email addresses was the only thing stolen, it was wrong -- passwords had been compromised as well.