Kayla Elliott

Trump Repeals ISP Regulations

ISP Regulations Repealed — Your Browsing Data Now Available to Highest Bidder Yesterday, April 3, 2017, President Trump signed a law repealing ISP regulations on selling consumer’s browsing data.  The law is not going to take effect until December of 2017.  Once the law does go into effect, ISPs will have the authorization to sell

Trump Repeals ISP Regulations Read More »

Pennsylvania Police Intervene With Support Scam

Officer Assists Local Resident with Phone Scam South Lebanon Township Police Department, in Pennsylvania, was able to help a local resident avoid becoming the next victim of a support scam.  The resident originally contacted the police department, afraid he was the victim of a ransomware attack.  When the police department arrived, the individual had allowed “tech

Pennsylvania Police Intervene With Support Scam Read More »

95K McDonald’s Applicants’ Information Was Breached

McDonald’s Canadian Website Hacked An estimated 95,000 people applied for jobs at various Canadian McDonald’s restaurants from March 2014 to March 2017.  Unfortunately, all of these applicants had their information recently hacked.  The leak was a direct result of the company’s online application site being breached. According to The Record, the breach is believed to occur

95K McDonald’s Applicants’ Information Was Breached Read More »

Are You Backing Up Your Data?

Several people believe backing up your data is critical to staying safe from malware attacks.  However, backing up your data has benefits beyond a malware attack.  For instance if your hard drive crashes, you’ll lose everything.  Unless you’ve backed it all up. So, do you back up your data?  Please take part in our survey

Are You Backing Up Your Data? Read More »

Users Grant Malware Permission to Manipulate Contact Information

Crusader Malware Manipulates Contact Information A new malware deemed Crusader has been found being installed on PCs all over.  The malware is actually an add-on to free bundle software programs.  By granting Crusader the permission they request, users are authorizing contact information found within ads to be manipulated.  Therefore, a legitimate ad could be altered

Users Grant Malware Permission to Manipulate Contact Information Read More »