Call Us Today at 757-750-1200

Blog

Adobe Flash May Soon End On Google Chrome

Adobe’s beleaguered Flash player may finally be seeing its last days, at least if Google has anything to say about it. The player has been exceedingly popular, and at its peak, a ...

New Tech Can Copy And Mimic Your Handwriting

Researchers at University College London have created a fascinating algorithm that can take a sample of hand-written text, and imitate it with eerie similarity. At first glance, that might seem like a ...

The WiFi of the Future May Consume Much Less Power

Battery life for mobile devices is their single biggest weakness. The greatest challenge in growing and managing the exploding “Internet of Things” isn’t the devices themselves, but rather, the power required to ...

New Bluetooth Is Coming And It Sounds Awesome

In late 2016 or early 2017, Bluetooth 5.0 will be released, and by all indications, this will be the version of the technology we’ve all been waiting for. It’s about to take ...

Oracle Micros Point of Sale Customers Reset Your Passwords

Does your company rely on Oracle Systems’ Micros to handle point of sale transactions? If so, you should change your password immediately. The company has recently reported that a sophisticated Russian cybercrime ...

Many Android Phones May Be Vulnerable To QuadRoot Hack

Security researchers from Check Point have unearthed a new vulnerability dubbed QuadRoot that leaves potentially 900 million or more Android-based smartphones vulnerable. The attack manifests when a user unwittingly installs specially designed ...

New Form of Malware Used Ads To Infect Computers

The FBI has recently shut down a particularly nefarious ad server called the AdGholas group, which used a new and innovative method of infecting computers and managed to avoid detection for several ...

Be Wary Of Open Public WiFi

Public WiFi is ubiquitous. Pretty much anywhere you go these days, you’re going to find a free network you can connect to. Stop in to grab some coffee, free WiFi. Grab lunch ...

A Number of Popular Wireless Keyboards Can Be Easily Hacked

In recent months, we’ve seen an upsurge in the number of attacks that have been executed by exploiting wireless peripherals attached to computers. Hackers can even intercept signals sent to your PC ...

Create An Email Policy For Your Employees To Protect Your Business

Does your company currently have a formal email policy? If you don’t, you need one, and sooner, rather than later. As the first “killer app” in the world of computing, email is, ...

Contact

Enterprise Backup, Inc.Enterprise Backup, Inc. Logo $$$

Social Media

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • RSS