BLOG
Not long ago, the first instance of ransomware was designed to effect Macs. This was greeted with an even mix of shock, surprise and dismay among the ranks of Mac users, and it did a lot to dispel the...
Another week, another big problem for the Internet of Things. This time, it’s smart cars and the apps that surround them. There are an increasing number of apps available for a growing number of makes...
Are you still using Yahoo mail? If so, your account may have been one of the billion or more accounts hacked in recent years. Yahoo’s email servers have been on the receiving end of two of the largest...
If you have a Gmail account, then you probably already know that you can’t attach .exe, .jar, or .pif files to any emails you send. Until recently, Javascript files were allowed, but Google has...
No matter how good your digital security system is, and no matter how much you’ve spent on it, your weakest link is and always will be your employees themselves. A careless or disgruntled employee can...
The Darkweb has trends, just like the conventional web does. In years past, the hottest data for sale on the black market was credit card info, but that is now changing according to the latest Trend...
Lockdroid is one of the oldest forms of ransomware in the Android ecosystem, and recently, it has been evolving at a frightening pace. Just last month, researchers found a version that displayed a 2D...
There’s a nasty new form of Malware making the rounds that targets Chrome users, so if that’s your browser of choice, be warned that if you’re not careful, you could wind up with a lot more than you...
In recent years, an increasing number of companies have migrated to the Cloud for cost-saving reasons, but today, we got a painful reminder of the limitations and risks associated with doing that...