Month: September 2018

What Do I Need To Know About The Google Chrome Vulnerability CVE-2018-6177?

What is CVE-2018-6177? Today’s new releases of browser software are supposed to be improvements over past versions in terms of functionality, helpful features, security, and the speed of overall operation. However, these changes…

Master Google Search In Just 28 Minutes

This month’s training on demand focuses on helping you find the most accurate information you need on Google. We’ll leave no stone unturned in this 28-minute online training session. Learn how to find…

What Should I Know About New Hacking Attacks Against Pairwise Master Key Identifier (PMKID)?

What is PMKID? Pairwise Master Key Identifier (PMKID) is a type of roaming feature in a network. Recent improvements in hacking have been targeting it for exploitation in vulnerable processes, thereby demanding that…

The Basics of Effectively Scheduling Meetings with Microsoft Teams

Microsoft Teams is a great way to schedule meetings, especially if the participants don’t all work in the same geographic area. It seamlessly integrates scheduling, invitations, updates, and access to virtual meetings. This…

What Are the Legal Impacts of California’s Potential Privacy Policy?

California is known for being on the cutting edge of most things, and consumer privacy is one of them. Scheduled to take effect in 2020, the California Consumer Privacy Act gives consumers broader…

How Can Instagram Accounts Be Hacked?

What Is Instagram And How Is It Vulnerable? Instagram is a recently created social media site that allows users to share images and videos. It is owned by the same soul that owns…