CfBlogs
 Data Grids  CF Overflow  Follow Us!  RSS

ColdFusion Posts Around the World.
Beware: Paypal Money Request Scam is back
Beware: Paypal Money Request Scam is back
Russ Michaels
If you have a paypal account, then literally anyone with an email address can request money from you. That’s the double-edged sword with PayPal – it’s simple to set up and use for legitimate purposes, but fraudsters can take advantage of that ease of use to perpetrate scams on the unsuspecting publi...
Have your Google Reviews been vanishing?
Have your Google Reviews been vanishing?
Russ Michaels
Just weeks after the Google Business Profile suspension nightmare, it seems Google learned nothing from all the problems they caused for businesses around the world and did it again. This time, they released a bug that caused hundreds of thousands of legitimate Google reviews to get removed from Goo...
Google Business Profile Suspensions Nightmare
Google Business Profile Suspensions Nightmare
Russ Michaels
If the guidelines are followed correctly, Google Business Profile (GBP) suspensions should not happen right? But if it does happen, getting your profile reinstated certainly shouldn’t take months, either. But, for a few weeks in October, Google has been causing nightmares for tens of thousands of bu...
Hackers using “push  bombing” to bypass your MFA/2FA
Hackers using “push bombing” to bypass your MFA/2FA
Russ Michaels
Multifactor authentication (MFA) is the gold standard in offices around the world and 2FA is the standard for end users. We all know the drill: you use your username (often your email address) and, perhaps, as the password, the name of your first dog and your kids DOB. Not very foolproof, and not re...
What is the difference between 2FA and MFA ?
What is the difference between 2FA and MFA ?
Russ Michaels
Cybersecurity is a complex topic and if you are the average layperson, you likely have found yourself asking “What is the difference between 2FA and MFA “. In simple terms, Two-Factor Authentication (2FA) requires users to demonstrate exactly two distinct methods of authentication, whereas Multi-Fac...
8 Crucial Digital Marketing Metrics You Should Be Tracking
8 Crucial Digital Marketing Metrics You Should Be Tracking
Russ Michaels
Digital marketing metrics are crucial to your campaigns’ success. After all, your key metrics give you insights into your digital marketing campaigns’ performance and help you understand the strategies that work (or don’t work) well. Tracking your metrics also helps you make better marketing decisio...
New Android malware bypasses multi-factor authentication to steal your passwords
New Android malware bypasses multi-factor authentication to steal your passwords
Russ Michaels
Cybersecurity researchers uncover MaliBot, a powerful new Android malware that steals passwords, bank details and cryptocurrency wallets from users. Besides being able to siphon passwords and cookies of the victim’s Google account, the malware is designed to swipe your 2-factor authentication codes ...
Your browser stores passwords and sensitive data in plain text
Your browser stores passwords and sensitive data in plain text
Russ Michaels
Lots of people use their browser to save their passwords, but most browsers store your sensitive data, including usernames, passwords and session cookies in plain text (not encrypted). Most Chromium-based web browsers are affected, including Google Chrome and Microsoft Edge. A quick test on other br...
Cryptocurrency Investment Fraud Advice
Cryptocurrency Investment Fraud Advice
Russ Michaels
I have always taught my kids about scams, online safety and security since an early age, yet despite my efforts, one of my sons still managed to get scammed by one of these scumbag fraudsters recently, emptying his bank account. As any parent will know, kids generally refuse to listen to any advise ...
Free user behaviour tracking for your website with Microsoft Clarity
Free user behaviour tracking for your website with Microsoft Clarity
Russ Michaels
I have recently come across this great FREE tool from Microsoft called Clarity, a user behavior and website debugging analytics tool unlike any other. What Clarity does is provide useful insights into how users interact with and use your site in realtime, making it completely different from other an...
Revenge of the QR code
Revenge of the QR code
Russ Michaels
Google to start enforcing two-step verification enrollment
Google to start enforcing two-step verification enrollment
Russ Michaels
Google will soon start pushing more Gmail users and Google Account holders to enable two-step verification — the extra layer of security that can
Understanding GDPR Data Controller in 5 easy steps
Understanding GDPR Data Controller in 5 easy steps
Russ Michaels
By now most of have heard of the General Data Protection Regulation (GDPR). But in case you've been carefully avoiding the news since 2017, it's a
Great Ideas to Boost Macbook Performance
Great Ideas to Boost Macbook Performance
Russ Michaels
Guest post by Justas Markus Do not expect a Macbook to perform the same way that it does the first time you start it. A time will come when you start to notice that it takes longer for applications to launch or that the loading screen after each restart is also not as fast as […] The post Great Idea...
Perfex CRM vs WHMCS
Perfex CRM vs WHMCS
Russ Michaels
When it comes to billing systems, most people in my line of business have heard of WHMCS. It is the defacto billing and automation system for most hosting providers but it is also very popular with many other types of business as well, such as ISP’s, website design agencies or anyone selling IT serv...
G Suite vs Microsoft 365 Comparison
G Suite vs Microsoft 365 Comparison
Russ Michaels
Trying to decide between G Suite vs Microsoft 365 (formerly office 365) for your business email address? Looking for a Google Apps vs Microsoft 365 comparison to see which one is better? G Suite (formerly Google Apps) and Microsoft 365 offer professional business email and productivity tools for eas...
Worm phishing campaign is a game-changer in password theft & account takeovers
Worm phishing campaign is a game-changer in password theft & account takeovers
Russ Michaels
A phishing attack taking place against an organization has revealed a crafty method to bounce between victims in a way deemed “ingenious” by a researcher. On September 29, cybersecurity architect and bug bounty hunter Craig Hays outlined a recent phishing attempt which went far beyond the usual spr...
Does using SSL make my website secure?
Does using SSL make my website secure?
Russ Michaels
The short answer to the question, does using SSL make my website secure is NO, but it is important to understand why and what SSL actually does, so read on. The biggest misconception by website owners is that an SSL certificate will make their website secure from hackers and malware, which is not tr...
Beware NCA National Insurance Scam
Beware NCA National Insurance Scam
Russ Michaels
Just got another new scam call today, this time claiming to be from the NCA. This one is a recorded message claiming to be from the national crime agency (NCA) and stating that they have detected some illegal activity on my name and national insurance number and need to cancel my national insurance ...
Your security questions/answers are not secure
Your security questions/answers are not secure
Russ Michaels
We all know we should create secure passwords. But, for all the time we spend worrying about our passwords, there's a backdoor you never think about. The security questions/answers that you provide to get back into your account if you lose your password are usually easy to guess or find out in order...
5 ways to detect phishing emails and scams
5 ways to detect phishing emails and scams
Russ Michaels
Phishing is one of the most common methods of cyber crime and scams, but despite how much we think we know about these scam emails, people still frequently fall victim. Action Fraud receives more than 400,000 reports of phishing emails each year, and according to Verizon's 2020 Data Breach Investiga...
Tech Time Warp: Charles Babbage, the father of computing
Tech Time Warp: Charles Babbage, the father of computing
Russ Michaels
After celebrating the dads in your life on Father's Day, consider raising a glass to Charles Babbage, the 19th-century Englishman known as the "Father of Computing." An independently wealthy man, Babbage was able to indulge in his fascination in mathematics and science to the world's benefit. His im...
What is spear phishing and how to avoid it.
What is spear phishing and how to avoid it.
Russ Michaels
We have all heard by now of the term phishing and how it works, where a generic email is sent with an encrypted URL or attachment and when it's clicked "BOOM"... you have been caught. But, over the last few years we have seen a significant rise in spear phishing. Spear phishing is technically the sa...



Footer Logo

Powered by Galaxy Blog

If you have an ideathat you want to share, please contact us! This community can only thrive if we continue to work together.

Images and Photography:

Gregory Alexander either owns the copyright, or has the rights to use, all images and photographs on the site. If an image is not part of the "Galaxie Blog" open sourced distribution package, and instead is part of a personal blog post or a comment, please contact us and the author of the post or comment to obtain permission if you would like to use a personal image or photograph found on this site.

Credits:

Portions of Galaxie Blog are powered on the server side by BlogCfc, an open source blog developed by Raymond Camden. Revitalizing BlogCfc was a part of my orginal inspiration that prompted me to design this site.

Version:

Galaxie Blog Version 3.0 (Toby's Edition) June 14th 2022 Tropical Wave theme