Category: Technology News

Sort By Category

What Is Smishing (And How To Protect Yourself)

What Is Smishing (And How To Protect Yourself)

Smishing is a new form of phishing that uses text messaging instead of email. It’s a growing problem worldwide, happening over 30 million times per day! Smishing scammers try to trick you into giving personal information by pretending to be a trusted person or...

Don’t let your heart bleed over Heartbleed

Don’t let your heart bleed over Heartbleed

It's a good thing when a technology vulnerability gets enough attention that it is patched quickly and methodically. However, it may also raise undue concern due to its complex nature and variety of headlines that leave us consumers confused and unsure what to do. The...

Don't let your heart bleed over Heartbleed

Don't let your heart bleed over Heartbleed

It's a good thing when a technology vulnerability gets enough attention that it is patched quickly and methodically. However, it may also raise undue concern due to its complex nature and variety of headlines that leave us consumers confused and unsure what to do. The...

Identity Theft Tactics – be aware and protect yourself

Identity Theft Tactics – be aware and protect yourself

Identity Theft is a horrible experience to go through. Just ask anyone who has been victimized. It can takes many years to arrive at a full recovery. So it makes sense to be vigilant about being a victor instead of a victim, as author Dianne Ojar-Ali alerts us in her...

Easily protect yourself from widget jacking

Easily protect yourself from widget jacking

Do you roam with your laptop? Do you use hotspots or guest wireless networks? If you answered yes to both of these questions, then you need to read this. I know what you're thinking: Another security issue I have to worry about? Everything I've done to keep my...

New law accepts everyday activities

New law accepts everyday activities

If you're like most of us, copyright laws are never easy to understand for those of us outside the legal profession. This is why for these topics we turn to the experts who know. David Canton is a business lawyer and trade-mark agent with a practice focusing on...

The anatomy of a targeted email account hack

The anatomy of a targeted email account hack

"OMG! My email is hacked!" This is a true account of an email hack we've just witnessed and helped a client through. It all started with one of our client's bank account manager calling our client (will call him Bob in this email): Bank: Bob, Happy New Year! We have...

Meetings in the Cloud – comparing GoToMeeting with zoom.us

Meetings in the Cloud – comparing GoToMeeting with zoom.us

Meetings in the cloud are easier than ever. Seeing the furrows in someone's eyes or the expression after a comment or question carries tremendous value, especially when comparing it to the difficult task of deciphering a message strictly on tone of voice and choice of...

Nerds On Site helps out on the Jim Relken Show

Nerds On Site helps out on the Jim Relken Show

We congratulate the Jim Relken Show on their successful launch of ebw.tv, and thank them for the opportunity to be part of its opening episode of reality TV, with real people, real businesses and real stories. Not only did Nerds On Site get a chance to be the "limo"...