(415) 246-0101

Microtechs Blog

Microtechs has been serving the Mill Valley area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Think You Own Your Social Media Accounts? Think Again

Think You Own Your Social Media Accounts? Think Again

It’s fun to be critical of social media, but there’s no denying the massive influence it has on individuals, societies, businesses, and even the political landscape. Since social media plays such a big part in so many areas of your digital life, it’s important to know how it all factors into your personal rights and privacy. Today, we want to examine the idea of who really owns what you post on social media and who is in control of your accounts… because it’s definitely not you.

0 Comments
Continue reading

That’s Not a Streamed Funeral… It’s a Scam

That’s Not a Streamed Funeral… It’s a Scam

Funerals are solemn events, and sadly, some people take advantage of those who are grieving. Recently, scammers have been using Facebook to target people by offering fake links to live-streamed funerals in exchange for credit card information.

0 Comments
Continue reading

Is Telegram’s Embedded Privacy Aiding Criminals?

Is Telegram’s Embedded Privacy Aiding Criminals?

The state of Internet security is always a trip. There are scams literally everywhere and there are better minds than ours that want to solve the myriad of problems that users run into online. One such platform is the secure communications software Telegram founded by Pavel Durov. In this attempt to revolutionize the instant messaging space, he’s found himself in some pretty hot water. Let’s dive right in.

0 Comments
Continue reading

Meta Shifts Gears and Opens Threads, a Direct Challenge to X

Meta Shifts Gears and Opens Threads, a Direct Challenge to X

Over the last half-year, Meta, the renowned social media conglomerate (formerly known as Facebook), has been strategically capitalizing on all the drama within Twitter (referred to as X) by introducing Threads, a microblogging community akin to its X counterpart. Today, we will look at Threads by drawing comparisons with Twitter and taking a look at Meta's motivations in enticing users away from the established microblogging giant.

0 Comments
Continue reading

What Twitter’s API Breaches Mean for Cybersecurity Trends

What Twitter’s API Breaches Mean for Cybersecurity Trends

Back in December of 2021, an API vulnerability impacting Twitter was disclosed. Just a few months later, in July, data from more than 5.4 million users—obtained through this vulnerability—was put up for sale, and more recently, another hacker shared the data online. Let’s take the opportunity to examine the concept of an API attack, and what can and should be done to stop them.

0 Comments
Continue reading

LinkedIn Users Exposed on Hacker Forums

LinkedIn Users Exposed on Hacker Forums

With every new day comes a new data breach that exposes the personal data of countless people. The most recent in this troubling trend is the LinkedIn data breach, an event that exposed 700 million profiles and led them to be put on sale on a hackers forum. LinkedIn denies the data breach, but how much truth is in this statement? Let’s take a closer look.

0 Comments
Continue reading

Technology That Is Helping Improve Society

Technology That Is Helping Improve Society

The emergence of technology has been at the forefront of all major evolutions of human society. Fire, the wheel, electricity, and countless other intuitive innovations have got us where we are today. If you were to quiz the average person, they would point out that today there seems to be so much derision on any subject that it seems that civilization is breaking down. This perspective fails to recognize the importance that technology plays in the dissemination of opinions. Today, we will take a good look at three technologies that are working to improve society.

0 Comments
Continue reading

Trying to Secure Our Votes, Online

Trying to Secure Our Votes, Online

The 2020 election is months away and traces of it can be seen everywhere. As people quarrel about how social media is being used to interfere with the political process, there is pressure mounting on election officials and tech companies, alike, to do what they can to keep solicitation and corruption out of the ballot box. Let’s take a neutral view of the changes that some online platforms are making to the way that political information is shared.

0 Comments
Continue reading

Tip of the Week: Creating a Twitter Thread

Tip of the Week: Creating a Twitter Thread

While one wouldn’t think of it immediately, Twitter is an important communication tool for businesses to use to reach their audience. While the brief-message format may seem like an obstacle to some, Twitter offers a feature that can sidestep this apparent shortcoming. For this week’s tip, we’ll go over how you can create a Twitter thread.

0 Comments
Continue reading

Facebook Privacy a Concern, Part II

Facebook Privacy a Concern, Part II

If you haven’t read part one of our Facebook privacy blog, it wouldn’t hurt for you to go back and read that one first. Today, we will be building off of that blog, teaching people how to properly configure their accounts to give them the best chance to lock down their private information.

Of course, Facebook, being one of the predominant web-based services in the world, has a checkered history when it pertains to individual’s privacy. In fact, I think a fair share of its ongoing troubles when it comes to individual privacy have a lot to do with their overwhelming success.

0 Comments
Continue reading

Tip of the Week: How to Download Videos from Social Media

Tip of the Week: How to Download Videos from Social Media

Social media has taken the world by storm, in no small part because of the videos that people share. We’ve all seen a shared video that we’ve wanted to keep. That’s why this blog will take you through the process of downloading videos from Facebook, Twitter, and Instagram.

0 Comments
Continue reading

How to Protect Your Company’s Reputation Online

How to Protect Your Company’s Reputation Online

When you run a successful business, you accrue a large client base. It eventually becomes impossible to please everyone, leading to some negative online reviews. With the rise of social media making it easier than ever before to take negative thoughts into the public’s view, you need to take a step back and consider your organization’s stance on how it deals with online reputation management.

0 Comments
Continue reading

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

0 Comments
Continue reading

Are Streaming and Social Media Giving You Headaches?

Are Streaming and Social Media Giving You Headaches?

Technology is omnipresent in this day and age. You can’t drive down the street without seeing a tween walking along staring into his/her smartphone, the fitness-minded person running with wireless headphones, or your car telling you that you have a new message. Nowhere is this tech explosion more visible than in your wallet. Today, we will take a look at two relatively new, and widely utilized technologies, and how you can keep them from costing you an arm and a leg.

0 Comments
Continue reading

Keep Security in Mind on Social Media

Keep Security in Mind on Social Media

Social media was created with the intent of staying in touch with others, but it comes with nasty repercussions. It comes at significant risk to both your personal and professional security. How can you make sure that your social media usage isn’t putting your organization at risk of compromisation or worse? The first thing that you want to take into account is awareness.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code