Get your exclusive Tech.Co local news and event updates!


Your Email Could Be the Welcome Mat to Hackers [Infographic]

By | May 3, 2017 at 7:00 pm

Some of the biggest security breaches involved emails and with more companies keeping data in the cloud, your email could be the doormat to your company’s secrets if you don’t sharpen your security skills. Here are five things you need to be diligent about…


5 Ways to Secure Your Email Conversations

By | May 1, 2017 at 9:15 am

As mobility and accessibility increases, so does the emergence of new security threats that seek to steal your most confidential information. Since businesses communicate primarily through email, it’s important to always keep your system updated with the latest security software. You need to be…


5 Cybersecurity Strategies Businesses Need to Implement in 2017

By | Mar 20, 2017 at 4:30 pm

Despite the prominence of cyber-attacks nationally, from politics-to-healthcare, most companies are doing little to protect themselves from hackers. According to Symantec, there were more than 429 million identities exposed in 2015 alone. Companies are at a higher risk of breaches now more than ever – 2016 breaches…


3 Ways to Recover from Ransomware Attacks

By | Feb 23, 2017 at 5:50 pm

Ransomware has become a $1 billion-per-year industry, and the threat is exploding. While a recent cybersecurity report identified 3.8 million unique ransomware attacks in 2015, that number skyrocketed in 2016 to more than 638 million attacks. Because ransomware attacks are typically initiated through email,…


How Can Small Businesses Prevent Cyber Attacks?

By | May 20, 2016 at 10:00 pm

Small business owners can become complacent when it comes to protecting their businesses from security breaches. In 2015, a survey on information security breaches carried out in the UK showed that 9 out of 10 large organizations suffered some form of security breach. Small…


Human Experts Are the Answer to Hackers

By | May 12, 2016 at 3:00 pm

There is an ongoing war between hackers and information security systems. It usually plays out far from the public eye and happens constantly on servers all over the world. Millions of events take place on computers that could potentially signal malicious activity, and it…


Study: Half of American Corporations Are Vulnerable to Hackers

By | May 9, 2016 at 7:00 pm

With the Panama Paper being released to the public and a recent hacker hitting major email accounts across the world, cyber attacks are on everyone’s mind. And while you might think this surge in hacker activity would keep corporations abreast of the latest security…


Huge Email Data Breach Means Your Passwords Aren’t Safe

By | May 5, 2016 at 4:00 pm

Emails have been hacked and your passwords aren’t safe. And while a data breach seems to happen every month or so, this one is for real. Seriously, this particular hack is going to take down all your accounts, and your important information is going to be in the hands of Russian…


You Need to Care About the Panama Papers

By | Apr 4, 2016 at 7:43 pm

With inequality in wealth distribution at an all-time high, it seems only proper that the largest data leak in journalism history contains information about how and where the world’s elite hid their money from their home countries’ tax laws. The Panama Papers look to inform…


Anonymous “Total War on Trump” Not Going as Planned

By | Apr 1, 2016 at 6:43 pm

In early March, the hacktivist group Anonymous declared “total war on Trump” for his xenophobic and sexist remarks during this election cycle. April 1st was the slated started date of this war. However, Anonymous hasn’t done much to put a dent in The Donald’s offensive and…


Government’s Credentials in Clear on the Open Web

By | Jul 16, 2015 at 8:00 pm

Recorded Future, a CIA-backed technology company has found logins and passwords for 47 government agencies strewn across the Web. The presence of these credentials on the open web leaves these agencies vulnerable to espionage, socially engineered attacks, and tailored spear-phishing attacks against their workforce. Image…

Startups & Apps

Little Rock

Neo Provides an Easier and Automated Way to Maintain Network Security

By | Nov 25, 2014 at 1:00 pm

If you have ever depended on a computer and the Internet for your work – personal or professional – you are aware of the risks of security breaches and hacker attacks. That probably makes about 99.99% of us! Organizations spend thousands every year on…


If You Don’t Break Rules, You Won’t Be Creative

By | May 7, 2014 at 9:00 am

This post includes extra content from Startup Mixology, my upcoming book on starting up – including how to prepare yourself for the harsh reality and celebrate positive moments along the way. Go here to pre-order the book (due July 8) and subscribe to updates.  It’s…

Dev & Design


Code Year: Is This The Year You Learn To Code?

By | Jan 3, 2012 at 7:37 pm

Is 2012 the year you take on learning to code? I hung up my coding shoes in 2006, but that hasn’t stopped me from hacking on a project here and there over the last few years. But over time, my skills for specific programming…


Siri Hacked: Five Of Our Favorite Hacks So Far

By | Nov 28, 2011 at 1:06 pm

It was only a matter of time before Apple’s voice activated assistant, Siri, was hacked. With the help of Applidium, hacker and developer Pete Lamoni (@plamoni) released Siri Proxy on GitHub. It’s a proxy server that allows developers and hackers to create custom functionality…


WordPress Hacked! Virus Cloaks Search Engines

By | Apr 8, 2010 at 9:39 pm

There’s an incredibly dreadful hack hitting sites using the popular open source blog platform, WordPress, right now, even sites that are running the latest most up to date version (2.9.2). We know first hand as it has attacked our site and many others. Popular…