Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

Imagine that you are the CEO of a mass media organization whose Twitter has just been hacked and was now posting 20 spam-filled tweets every second. You’ve just put yourselves in the shoes of Tim Armstrong, CEO of now-Verizon-subsidiary AOL.

Continue reading
0 Comments

Alert: Android Malware Can Control Your Phone Through Twitter

Alert: Android Malware Can Control Your Phone Through Twitter

Hackers continue to innovate and cause trouble for businesses of all industries and sizes. One of the more interesting recent tactics includes utilizing a malicious Twitter account to command a botnet of Android devices to do its bidding. Twitoor is considered to be the first real threat to actively use a social network in this manner, making this a major cause for concern.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

IT Support Motion Sickness Superfish App User Tips Net Neutrality Cleaning Managed IT Network Management Robot Notifications Tip of the Week Best Practices Save Time Computers Microsoft Excel Hard Drive Hacking Botnet Apps Technology Laws Productivity Operations Experience Mobility Unified Threat Management Public Cloud Search Public Speaking Internet Office 365 Blockchain Smartphone Tech Support Fraud Mouse Hardware Migration Mobile Data Mirgation Digital Signature Cloud Computing Law Enforcement Network Security Employee-Employer Relationship Remote Workers Recycling Android Hiring/Firing Star Wars SaaS Word Deep Learning Flexibility Business Management Programming Financial Hard Drives Printer Passwords Web Server Windows 10 Fleet Tracking Wearable Technology IT Management Shortcut Hacker Document Management Business Intelligence Cookies Specifications Proactive Conferencing Lenovo Nanotechnology Data storage Business Cost Management Miscellaneous Training Productivity Infrastructure Outlook Wireless IT Technicians Scam Twitter Dark Web Scary Stories Presentation Bandwidth Processors LiFi Customer Relationship Management Smart Tech Tech Term Legal SharePoint Software as a Service Downtime Techology Wi-Fi 3D Printing Antivirus User Error Managing Stress Vulnerability Phone System Administration Files Maintenance Google Docs Personal Information Enterprise Content Management Mobile Devices Typing Cloud Spam Taxes Alt Codes Social Software Tips Backup Time Management Saving Money Virus USB Private Cloud Proactive IT Education Social Networking User Hard Disk Drive Government Mobile Tech Terms Browser Alert Two-factor Authentication Co-managed IT Technology Tips Social Engineering HIPAA Computer Undo Vulnerabilities Legislation Save Money Virtual Desktop PowerPoint Troubleshooting Automation Monitoring Websites Physical Security Router Human Error Computing Hacks Outsourced IT Windows 10 Assessment Test Hotspot Unified Communications Gadgets Data Management Money Firewall Internet of Things G Suite Knowledge Google Computing Infrastructure Google Maps Tip of the week Piracy Chrome Data Security Upgrade Customer Service Mail Merge Data Backup Point of Sale History Work/Life Balance Supercomputer File Sharing Meetings RMM Cortana Dark Data Innovation Halloween Update Apple Data Recovery Environment Writing Phishing Software Remote Worker Remote Monitoring and Management Identity Technology Going Green Machine Learning Solid State Drive Data Hosted Solution Permissions Compliance Windows Analyitcs Fun Operating System Network Congestion Applications Small Business Computer Repair Gadget How To Server Management Staff IoT Digital Employer-Employee Relationship eWaste Employees Backup and Disaster Recovery Bitcoin Identities Upgrades Spyware Website WannaCry Drones Big Data Humor BDR Managed IT Services CCTV Settings Competition Finance Connectivity Bluetooth Consumers Artificial Intelligence Management Office Tips Zero-Day Threat Security Cameras WiFi Business Technology Patch Management Monitors Tablet Wireless Technology Vendor Management Content Filtering Asset Tracking Server Ransomware Automobile Documents Webcam Crowdsourcing Instant Messaging Privacy End of Support IT solutions Access Control Holiday Consultation OneNote Cyberattacks Best Practice CIO Telephony Break Fix Communication Virtual Reality Business Continuity Display Disaster Recovery The Internet of Things Theft IT Consultant PDF VoIP IT Support Remote Computing Screen Reader Risk Management Redundancy Backups Company Culture Social Media Cryptocurrency Managed IT Service Saving Time Cabling Trending Hackers Unified Threat Management Facebook Bookmarks Permission Users iPhone Tracking Procurement Quick Tips Marketing Smart Technology Multi-Factor Security IT Services Chromebook IT service IT Budget Managed IT services Mobile Device Managment Lithium-ion Battery Error Regulations Refrigeration E-Commerce Authentication Information Technology Internet Exlporer Licensing Cameras Managed Service Provider Chatbots Motherboard ROI Disaster Mobile Security Black Market Modem Healthcare Current Events Distributed Denial of Service Unsupported Software Servers Efficiency Mobile Device Management Business Computing Help Desk Telephone Systems Google Drive Address Politics Emoji Cybercrime Downloads Gmail GPS Managed Services Provider Google Calendar Sports Wires Cooperation Remote Monitoring Touchscreen Staffing Information Sync Virtualization Safety Corporate Profile Application Workplace Tips Security Firefox Authorization Identity Theft Comparison VPN Budget IP Address Geography Electronic Health Records Travel Virtual Private Network Utility Computing Enterprise Resource Planning Running Cable IT Consulting Microsoft Electronic Medical Records Managed Service Hosted Solutions Storage 5G Password How To Development Disaster Resistance Entrepreneur Uninterrupted Power Supply Read Only Features Project Management Health Microsoft Office Windows 8 Data Breach Cyber Monday High-Speed Internet Digital Payment IBM BYOD Encryption Samsung VoIP communications Data Warehousing Intranet Administrator Malware Smartphones Networking Google Wallet Favorites Language Avoiding Downtime Buisness Cybersecurity Office Mobile Computing Bring Your Own Device Printing YouTube Collaboration Recovery Data loss Laptop Heating/Cooling Business Growth Statistics Augmented Reality Alerts Email MSP Black Friday Analytics Computer Care Mobile Office Cables Network Mobile Device Retail Consulting Business Owner WPA3 Domains Paperless Office Cache Relocation

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code