BLOG
Ever since the discovery of the dreaded Stuxnet worm in the wild, security experts have been concerned that a devastating cyberattack could be launched against critical infrastructure, causing signal...
It’s been long-held conventional wisdom that the safest place you can purchase apps is either the Google Play Store if you have an Android device, or the Apple Store if you’ve got a device built...
The fact that Microsoft Office Products (Word, PowerPoint and Excel) can be used to install malware onto an unsuspecting user’s computer has been common knowledge for years. But recently, security...
If you haven’t heard of a company called Rafotech, you’re not alone. But the simple truth is that they control an enormous network of infected computers, numbering more than 250 million devices. That...
Do you visit the GodLike Productions forum? If you’re not sure what that is, then you don’t have anything to worry about, but if you’re a member of that forum, you may have been infected by a...
If you use a router built on old WiMAX technology, be advised that you’re very likely at risk. The severe security flaws were discovered by the security firm SEC Consult, and take two forms. Firstly...
Microsoft has issued an emergency, out-of-band patch to shore up some critical weaknesses in Window’s Malware Protection Engine. This is an unseen part of the OS that actively scans and prevents...
An AOL developer named Ran Bar-Zik has unearthed a disturbing flaw in Chrome that may make you rethink using Google’s web browser. The issue revolves around a website’s ability to activate your camera...
Security professionals have been talking for months about the dangers of smart devices, most of which are almost comically (and tragically) lacking in even the most basic security protocols. More...