BLOG
Distributed Denial of Service Attacks (DDOS) have been used by hackers since the earliest days of the web. Get enough internet-connected devices to ping a server at the same time, and you can knock...
Recently, Apple announced two important new improvements to the way the company handles and tracks user data. That includes data used by third-party apps downloaded and installed from the Apple App...
Cellphones are everywhere. There are literally billions of them in service and many people have and regularly use more than one. They also represent a significant investment, and the hope is that when...
If you do any photo editing online, odds are good that you use PIXLR. It is one of the most popular such sites on the web because it offers many of the features you find in professional photo editing...
On January 19th, 2021, Google released a new Chrome version–Chrome 88. The most notable part of this release is the removal of the Adobe Flash Player and FTP features. FTP Removal Google removed...
Teespring is a popular destination on the web that allows users to create and sell custom-printed apparel, including, as the name implies, custom-designed tee-shirts. If you use the site, you should...
Ransomware attacks are one of the most prevalent cyber attacks on healthcare. It has been around for many years, however, it became a trend in 2016. Recently, there is a significant increase in the...
While Google has come under fire from privacy groups in recent months, the fact remains that on balance, the company is working hard to improve overall user experience on the web and provide better...
Google is unquestionably the dominant search engine on the web, but how secure is their position? If recent trends are any indication, they’re in no immediate danger. However, it’s clear...