BLOG
The spinning disk hard drive has been the reigning king of storage for almost as long as we’ve had desktop computers. All things end, though, and the HDD’s reign is officially coming to a close. It’s...
CVE Details is a website that tracks bugs in various software systems, aggregating the data and issuing an “award” for the software that has the most reported bugs in any given year. This year...
Privacy has been on the endangered species list for a while now, but the growing number of smart devices in people’s homes is putting an increasing amount of pressure on what little privacy remains...
Darren Cauthon, a software developer, got a Christmas present this year he didn’t ask for and didn’t want. On Christmas day, his family downloaded and installed an app on their Android-based LG Smart...
A very strange and disturbing case of the theft of protected health information has come from the New Hampshire Department of Health and Human Services (DHHS). The department recently reported on an...
Microsoft has been hard at work experimenting with various ways to optimize performance. One of the most recent experiments to come to light is the advent of “Windows Gaming Mode.” Slated to be...
File this one away under “it should go without saying, but” One of the most amazing and disheartening aspects of internet use is that after all this time, a shocking number of people are still getting...
The government is taking a more active hand in establishing security protocols for at least one part of the Internet of Things. Specifically, new guidelines are being drafted by the FDA to set minimum...
Hardly a week goes by that a new exploit or attack vector doesn’t come to light that your IT staff has to try to defend against. The most recent threat comes from a vulnerability in the PHP Mailer...