Office App: Your new Microsoft Office on the Go

Most Microsoft Office users hardly use their phone to do their work, if ever they do its for revisions or small adjustments.  Users usually save majority of the work for when they can use a desktop, this should be expected as the mobile version, while handy, had a lot of limitations.  Microsoft took this as […]

Malware in a X-Ray Machine Adds Tumors to the Test Results

What Malware these days are getting more versatile in the way they do attacks.  Ransomware attacks were one-way people thought of new ways to use malicious programs to exhort money from unfortunate victims.  Other attacks are meant to exploit vulnerabilities to get into your system to steal your data.  Recently however, there has been a […]

Recovery Failure: Spotting What Went Wrong

Everyone knows that backup is critical to a business’ operations to ensure that everything keeps going in a case of an unforeseen disaster. However, many businesses do not have backups until a disaster strikes, and for those who do have their backups, they can sometimes fall into a false sense of security. One good example […]

PlunderVolt: A new Vulnerability found in Intel Processors

Academics from three universities across Europe have disclosed today a new attack that impacts the integrity of data stored inside Intel SGX, a highly-secured area of Intel CPUs. It was reported by three academics from three different universities across Europe that a new attack was re that affects the integrity of data stored in the […]

Liberty Mutual: An Insurance Case Study for Office 365

In the insurance industry, business is all about protecting valuable items of people.  This is why insurance industries need to make sure that they are using tools and technology that serve to bring their clientele sufficient protection.  This is to help make sure that their products and services stay innovative.  A good example of a […]