The last few grains of sand in Windows XP’s hourglass are beginning to run out, and one group in particular sits eagerly awaiting the discontinuation of the old operating system. Eventually, the OS will stop receiving security updates; updates that keep you and your system safe from cybercriminals and hackers. On April 8th, those defenses will be gone and 500 million PCs that run everything from ATMs to your business will be exposed.

April 8th, 2014 will be the end of an era for Microsoft as they terminate support for Windows XP. For the past 10 years, people have used the company’s first mass-market operating system, and in just a few weeks it will be time to say good-bye. Most programs would have been completely phased out by now, but there are still quite a few XP users; users who more than likely are wondering what will happen to their soon-to-be-outdated operating system.

We weren’t kidding when we said that the Internet was abuzz with internet security concerns in a recent blog about password management, and Friday made that all the more clear as Apple released iOS 7.0.6. The update was released quietly, simply stating that prior to the update, “an attacker with privileged network position may capture or modify data in sessions protected by SSL/TLS.” What does this mean to those of us who aren’t fluent in the lingo? Update your iPhone immediately! But what does this all mean if you’re not super techie? We’ll spell it out for you.

There has been a recent surge in hacker activity; it seems like every week we get news of another security breach into the customer database of big-name companies. On Saturday, the crowd-funding site Kickstarter sent out an email to all registered users, and posted a blog on their website, notifying users of a security breach that occurred Wednesday night. Kickstarter was notified by law enforcement officials that their data had been compromised, and the immediately closed the breach and strengthened their security measures.

Last month the new broke of some savvy hackers pulling off a never-before-seen scheme in Europe. As BBC reported, this operation came to light at the Chaos Communication Congress in Hamburg, Germany, an annual event where hackers from all over the world go to meet.

An individual’s technical skills can carry her professionally for quite a distance in virtually every industry. The world of cyber security is no exception to this rule, evidenced by a shift in hiring choices being made by many organizations, especially government agencies. In this day and age, protecting classified information is of utmost importance, and many employers are focused on filling their teams with people whose technical skills shine the brightest. If you asked the best of the best cyber security professionals, where do you think they’d say they gained their most valuable knowledge? It probably wasn’t in a lecture, that’s for sure.

What will they think of next?! That seems to be the question every time some breakthrough technology emerges, and today is no different after Amazon’s latest announcement. Yesterday, news broke of their newest R&D lab project: Prime Air. As the leaders in shipping efficiency, it should come as no surprise that they’ve been cooking up another plan to somehow hasten their shipping process. How fast will shipping be using Prime Air, you ask? 30 minutes or less!

Apple has done it again—released a product that tops its predecessor and pulls them back to the top of their market. With the Microsoft Surface tablet commercials taking a direct jab at Siri, and the iPad’s lack of functionality by comparison to the new MS device, it looked like the iPad was going down. However, Apple’s made a comeback and the Surface 2 is going to have to put in some serious work if it’s going to top the new iPad Air.

There’s a new virus causing potentially irreparable damage spreading across the entire internet. CryptoLocker is a ransomware program that infects entire computer networks and encrypts many file types, causing potentially irreparable damage. The virus enters an individual system when a user clicks a link, often sent via email that opens the door for the virus. At this point, the virus saves itself as a randomly named file, where it begins to wreak its havoc. The infection attempts to communicate with a server that the hackers have set up, which returns an encryption key to the virus. Using this encryption key, CryptoLocker will then scan all physical and mapped network drives connected to your computer for files with the following extensions:

At Transitional Computing, we pride ourselves in our position at the forefront of technological development. Every time our industry experiences an evolution of any magnitude, we strive to become masters of the changes, to ensure that we are always providing our clients with the most current support available. For the last ten years, we have successfully protected our clients against malicious malware and hardware failures by staying on top of technological innovations and strengthened security measures. We are incredibly appreciative of the loyalty our clients have shown us, and it is with great excitement that we are announcing our re-branding.