Blog

The phishing craze that’s blindsiding users

The phishing craze that’s blindsiding users

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam.

Back up your mobile devices now

Back up your mobile devices now

Mobile phones’ sizes and styles went through massive changes in the last few years. And as their looks and dimensions changed, so did their functions. With better capacity and bigger storage, mobile phones turned into veritable mini-computers that businesses were quick to adopt as a vital office tool.

Are you using this WordPress checklist yet?

Are you using this WordPress checklist yet?

Many would initially blame hackers for an extremely slow website or being delisted from search engines, but that’s not always the case. When it comes to managing your website, how sure are you that all your bases are covered? If you are unsure, you might want to give this WordPress maintenance checklist a try.

Hands-on virtualization with a 1990s Mac

Hands-on virtualization with a 1990s Mac

Even if virtualization has been explained to you before, it’s entirely possible that the definition didn’t stick. There are so many variations of this technology that we take it upon ourselves to periodically review its most basic functions. And because these variations aren’t concrete enough to easily understand them, this time we’re including a virtualized desktop for you to play with!

What is virtualization?

The simplest definition is this: It’s the act of creating a virtual (rather than physical) version of something, including hardware platforms, storage devices, and computer network resources.

Fake Skype ads lead to ransomware attacks

Fake Skype ads lead to ransomware attacks

Hackers have used Skype to conduct various phone scams; but this month, they have found a new way to exploit the popular video calling app. Ransomware, which has predominantly been distributed via email attachments and URL links, is now being delivered through fake Skype ads.

Should you fear government surveillance?

Should you fear government surveillance?

Accusations of inappropriate government surveillance have been swirling after Wikileaks recently released thousands of pages supposedly detailing the CIA’s exploitation of compromised devices and applications. But in today’s climate, every headline needs to be taken with a grain of salt.

3 great upgrades to Chrome this month

3 great upgrades to Chrome this month

Unlike the release schedule of the Android operating system, new versions of the Chrome browser come out so often that they’re distinguished only by the version number. The most recent release is number 57, and it packs a little more wallop than the average upgrade.

Results Technology Added to List of Tech Elite

Results Technology Added to List of Tech Elite

Tech Elite 250 list recognizes IT solution providers with deep technical expertise and premier certifications
Lenexa, KS, March 27, 2017 – Results Technologyannounced today that CRN®, a brand of The Channel Company, has named Results Technology to its 2017 Tech Elite 250 list.

Azure and XenDesktop cozy up to each other

Microsoft has been working closely with software vendors to make it easier for businesses of all sizes to have access to virtualization services. The latest development in this effort has resulted in cheaper, simpler, and more modern solutions to the complexities of remote desktop administration.