Don't Believe These 6 Mobile Security Myths

Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies to our mobile device. Here are some of the most common mobile security myths....more

Panasonic Booth Tour #CES2015

My favorite Consumer Electronics Show (CES) activity is roaming the showroom floor and seeing all the new technology. This year I was excited to work on a sponsored project for Panasonic and...more

Twitter Wants Photos, Not Links, from Instagram Users

It made news this week when Twitter asked Instagram users to post images directly to Twitter instead of posting a link to the photo on Instagram. When an image is posted on Instagram, the user can choose to send a link to the image to Twitter. An image from Instagram will show up on Facebook when shared there, but Facebook owns Instagram ....more

3 Types of Trolls You'll Encounter on Twitter

Twitter can be a phenomenal place. Networking opportunities and hilarious trending topics are enough to command our attention for hours. However, we have all been victims of trolling moments on Twitter. These random interactions are often hurtful, unnecessary, or just plain annoying. And, we witness the same aggravating behaviors every day. ...more

I am tired: In praise of details-oriented people

Our Project Manager, Jessica,...more

The Sims 4 Apocalypse Challenge is Coming

Inspired by the Boston Scenario of the original Sim City, The Apocalypse Challenge starts things with a bang! ...more

How to Host Your Own WordPress Blog

Here is an infographic that takes you through the process of how to host your own WordPress blog! The post How to Host Your Own WordPress Blog appeared first on A Prettier Web ....more

If You use these Passwords, You will get hacked

Have you heard of iDict? It’s a tool that hackers can use to get passwords via what’s called brute force attacks. It’s designed to crack into iCloud’s passwords, and supposedly it can circumvent Apple’s anti-brute force attack security....more

FREE The Online Money Making Machine eBook

Hurry over to Amazon to get this handy FREE The Online Money Making Machine eBook! This is a great resource to help you start making money online and building your own online business. This book contains proven steps and strategies on how to make good amount of money by leveraging the internet ....more