Earlier this year, thousands of Delta passengers worldwide were grounded due to a power outage that halted critical IT operations. This was a huge problem not only for the many delayed travelers, but also for the airline company itself. Within three days, the airline company cancelled around 2300 flights and paid over millions of dollars […]
How to avoid your own Delta IT disaster
Master your next Powerpoint presentation
Back in the prehistoric ages, Neanderthals resorted to cave drawings to tell bedtime stories or to announce marriages. Microsoft PowerPoint is the modern-day equivalent of cave art; the objective remains unchanged, but its efficiency can be questionable. That’s because there are so many bells and whistles that can easily distract the audience from the speaker. […]
Apple announces iOS 10 release date
Apple loves dramatic product reveals, and unfortunately that often means long wait times for new devices and software. Consumers have had plenty of opportunities to read about how great iOS 10 is, albeit with no official release date to accompany it. However, after putting another Apple keynote in the books, we finally have our answer. […]
Android Nougat’s top 9 features
What gets you out of bed each day? Is it the smell of freshly-brewed coffee or the sounds of bacon sizzling on the pan? Now apply this toward smartphones: What gets you really worked up? Could it be the new, sleek design or its upgraded selfie camera? Regardless of the reason, we are all drawn […]
New security patches for VMware machines
While virtualization still has a host of security advantages over its localized counterparts, it isn’t exempt from the attention of cyber attackers. Most recently, one of the industry’s leading software vendors, VMware, was forced to release a patch for a critical vulnerability that allowed underprivileged users to attain access to administrative rights. Let’s delve deeper […]
How Fantom is haunting unsuspecting users
The heart of a lady is not easily won; a man can’t rely on his looks or wallet to make a girl fall head over heels. He must charm his way into her heart. Let’s say that a computer user is the woman, and that ransomware, the man, is the dreamboat that has worked his […]
Google’s cloud services are no longer beta
In an age where we sometimes move faster than the speed of light, patience is a quality not many possess. Like children who keep asking “Are we there yet?” or “When can I have another cookie?”, those who don’t learn to wait are denied the harvest of sweeter fruits. The 21st-century equivalent is Google’s cloud […]
Ransomware and Business Email Compromise (BEC) Lead Year of Online Extortion
Source: Trend Micro
Emails have become the battleground for the first half of the year in terms of security. It is the number one infection vector that have ushered in 2016’s biggest threats so far—ransomware and business email compromise (BEC). Ransomware infections normally start via email.
Keep your Dropbox secure
The next time you visit Dropbox.com, you may be asked to create a new password. Why? Back in 2012 the cloud storage firm was hacked, and while it thought only email addresses had been stolen, new evidence has come to light that user passwords were compromised, too. So if you’ve been using Dropbox since that […]
Business projectors: a buyer’s guide
If your last business presentation was dim, faded, or encumbered by bulky equipment, it’s probably time for a new office projector. And like any hardware purchase, that means a host of new specifications and measurements need to be learned to avoid sinking money into a useless lemon. If you’re in the market for a quick […]