
Technology and Your Health
The human body can accomplish a vast array of unimaginable feats. From running cross-country to swimming across rivers, or even pulling cars, we are built to test our physical limits.

IT Strategies for Your Business: Firewalls
Firewalls have been the first line of defense in network security for nearly 30 years. A firewall is a network security device that monitors incoming and outgoing traffic and decides

Don’t Trust Your Smart Devices
Smart devices like Amazon Echo, Google Home, and Amazon Ring have made the lives of millions of people more convenient, and to an extent safer. Unfortunately, the trade-off is their

IT Strategies for Your Business: Typosquatting
Users may be tricked into entering sensitive details into these fake sites. For organizations victimized by these attackers, these sites can do significant reputational damage. Typosquatting is a type of

What is the The Dark Web? Pt. 2
Dark websites look pretty much like any other site, but there are important differences. The biggest is the naming structure. Instead of ending in “.com” or “.org”, these sites often

What is a Dusting Attack?
As anonymous as investors would like Bitcoin to be, it isn’t. Hackers can still track funds and all the transactions with multiple methods. A hidden technique cybercriminals like to use

What is Cryptojacking?
Mining cryptocurrencies can be very lucrative, but making a profit is challenging without the means to cover large costs. Cryptojacking is the unauthorized use of someone else’s computer to mine

Clearing Your Digital Footprint
The average person would be surprised how much information about them is out there in the open. The more active we are on the Internet, the larger our digital footprint

What is Encryption?
People have always wanted to disguise or protect sensitive information from unintended eyes. In 1900 BC, Egyptian noblemen used a simple hieroglyphic substitution in the tomb of Khnumhotep, altering one

IT Strategies for Your Business: Logic Bombs
In 1982, the CIA allegedly found a way to disrupt the operation of a Siberian gas pipeline to Russia without using explosives. The damage was so large, it is reported