Blog

Stay up to date with the latest technology trends, news, and tips

Protecting Yourself from Identity Theft

Cybercrime activity is escalating and shows no sign of slowing down. That’s a fact of life in the early 21st century.  Information stolen from computer systems is used by cyber criminals in a variety of ways, but one of the most common scenarios is to open credit cards or bank accounts on behalf of a

Read More »

Providence Offers Managed Website Design and Hosting

Do you find your website time consuming to manage? Or have you simply been putting off a redesign because of big upfront investments for little results? We’ve recently partnered with a contract-free, affordable website service that won’t let you down – Pronto Marketing. How do we know? It’s the same company that currently manages our

Read More »

Norse Attack Map

When you have a few minutes and want to watch something intriguing, take a look at this link, and if appropriate, share it with friends: https://map.norsecorp.com/ This is a real-time Web Attack map which demonstrates why are we so focused on cyber security. This is not fictional. These automated attacks are occurring 24x7x365. The bad

Read More »

FBI Warns about Fake Government Websites

Late last week our FBI issued a Public Service Announcement warning about fake government websites being hosted by criminals with the intent of stealing information and money from US citizens. The sites are designed to look like real government websites and have Internet Domain Names (URLs) that look like real government sites. Consumers are directed

Read More »

Secunia Reports Vulnerabilities are Everywhere

Secunia, a Software Vulnerability Management company, recently reported that during 2014, “the absolute number of vulnerabilities detected in software was 15,435, discovered in 3,870 applications from 500 vendors. The number shows a 55% increase in the five year trend, and a 18% increase from 2013 to 2014.” These statistics are frightening to me, and should

Read More »

Dangers of running Java in a secure computing environment

Java is a programming language and computing platform first released by Sun Microsystems in 1995, and now owned by Oracle. It is estimated to be installed on 850 million personal computers and on 3 billion devices worldwide, including consumer electronic and mobile devices. As the installation base of Java software has grown and become more

Read More »

Password Management Made Easy

Passwords are the keys to our digital world. Like physical keys, they should be treated with respect and only given to those people who need to “unlock” something, in this case a computer or website. Unlike physical keys, they are easily stolen, discovered or duplicated without the permission or knowledge of the user who owns

Read More »

Password Management Made Easy

Passwords are the keys to our digital world. Like physical keys, they should be treated with respect and only given to those people who need to “unlock” something, in this case a computer or website. Unlike physical keys, they are easily stolen, discovered or duplicated without the permission or knowledge of the user who owns

Read More »

Security Alert – Zero Day Vulnerability found in Adobe Flash Player

Yesterday several independent security researchers found that a previously unpatched flaw in Adobe’s Flash Player application is being actively exploited. Since the flaw was not detected by Adobe, and there is no security patch available to fix it, the risk of falling victim to an attacker is high. The exploit is apparently being included in

Read More »
Archives
Scroll to Top