BLOG
Do you use any of the following Chrome browser extensions? Change HTTP Request Header Nyoogle – (a custom logo for Google) Stickies – (a Post-It note for Chrome) Lite Bookmarks If so...
Does your company utilize either RackSwitch or BladeCenter networking switches? Are those switches running ENOS (the Enterprise Network Operating System)? If so, there’s a backdoor in your...
A duo of researchers stumbled across a series of vulnerabilities in literally hundreds of GPS services that leave sensitive GPS tracking data open to hackers. Dubbed “Trackmageddon” by...
There’s a constant tug of war playing out on the national stage. On one side, privacy advocates are pushing for greater autonomy for end users, and hard limits to the types of searches that law...
Remember the KRACK WiFi (WPA2) vulnerability, discovered by Mathy Vanhoef? It turns out that his discovery was a catalyst for action. Recently, the WiFi Alliance, which is the industry’s...
What’s an HDD manufacturer to do when faced with competition by faster, more efficient SSD drives? Go big, and go faster. At least that’s the strategy that both Seagate and Western...
Recently, a group of investors wrote an open letter to Apple, urging the company to do more in regards to offering better and more robust parental controls on the devices the company makes. Although...
Did you purchase an HP laptop between December of 2015 and December of 2017? If so, then you may have problems. The US Consumer Product Safety Commission has been made aware of eight instances where...
The owners of Android devices have been able to properly view vertical videos for more than two years, but for Apple users, it was a different story. Instead of getting the traditional full-screen...