Motor City Technology Blog

Recent blog posts

b2ap3_thumbnail_fathers_day_june_15_400.jpgIf your Dad happens to be a business owner, then you know how hard it can be to give him a nice Father's Day present. Business owners tend to be good at buying themselves whatever they need or want. Every business owner can benefit from IT services. It's the gift that keeps on giving!

Last modified on

b2ap3_thumbnail_phishing_scams_400.jpgThe Internet is a vast ocean filled with all sorts of different creatures. Many are harmless, like the bottlenose dolphin, but once in a while you will encounter an aggressive shark. But no matter how powerful or intelligent these creatures are, they still wind up flopping around on the deck of some fisherman's boat. Why? Because fishermen know what they're looking for and how to capture it. The same can be said about Internet phishers.

Tagged in: Hackers Privacy Security
Last modified on

b2ap3_thumbnail_remote_it_400.jpgTechnology might be growing more mobile, but the need for support remains the same. Yet, the need for technical support on-the-go grows ever more important. What will happen to your business if you aren't able to get IT support, and it's an emergency?

Last modified on

b2ap3_thumbnail_cortana_400.jpgMicrosoft has changed its tune recently. They have made a serious push to take advantage in the mobile computing explosion by creating software that is designed specifically for the mobile device user. When the software giant released Windows Phone 8 in the fourth quarter of 2012, many thought it was only a matter of time before the software would resonate with mobile users. Unfortunately for Microsoft, the smartphone market hasn't been as friendly as the home and business computing market, and Windows Phone 8 has been a thorough disappointment.

Last modified on

b2ap3_thumbnail_game_over_zeus_400.jpgA new botnet threat could spell "game over" for unaware Windows users - the threat targets almost all versions of Windows and Windows Server (excluding Windows 8.1). Even though the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice have disrupted it, users are still at risk. Thankfully, they still have time - two weeks, until the threat returns.

Tagged in: Alert Malware Security
Last modified on