blog

BLOG

2 Million Credit Cards Stolen From Popular Sandwich Shop

By now, we’ve seen enough large-scale Point of Sale (POS) credit card thefts that patterns are beginning to emerge.  Some companies follow the general arc of the narrative better than others...

Mac Computers Battling New Malware For Hijacking DNS

It’s official, the first macOS malware of 2018 is here.  Discovered by an independent security researcher and dubbed “OSX/MaMi,” the code is functionally similar to DNSChanger...

Use Of Bots Has Increased Fake Account Creations

The ThreatMetrix Cybercrime Report 2017 is out, and is a troubling read for anyone who has anything to do with data security.  As a fraud prevention company protecting nearly a billion and a half...

Intel Chips Face Another Possible Vulnerability

Intel’s year isn’t getting off to a very good start.   Just after the discovery of a pair of critical vulnerabilities that have been in their chipsets for more than a decade comes the...

Inappropriate Ads Found In Some Game Apps for Kids

Normally, Google’s robust series of checks and audits are pretty good at catching malicious code and preventing it from making its way to the Play Store.  Sometimes, however, something slips...

Do Not Use These Chrome Extensions

Do you use any of the following Chrome browser extensions? Change HTTP Request Header Nyoogle – (a custom logo for Google) Stickies – (a Post-It note for Chrome) Lite Bookmarks If so...

Backdoor In Certain Lenovo Switches Discovered

Does your company utilize either RackSwitch or BladeCenter networking switches?  Are those switches running ENOS (the Enterprise Network Operating System)?  If so, there’s a backdoor in your...

Vulnerabilities Found In Some GPS Services

A duo of researchers stumbled across a series of vulnerabilities in literally hundreds of GPS services that leave sensitive GPS tracking data open to hackers.  Dubbed “Trackmageddon” by...

Electronic Device Search Rules Better Defined By US Customs

There’s a constant tug of war playing out on the national stage.  On one side, privacy advocates are pushing for greater autonomy for end users, and hard limits to the types of searches that law...