BLOG
By now, almost everyone is aware that Adobe Systems’ Flash Player is in trouble. Critical security issues are being reported faster than the company can fix them, but kudos to Adobe for gamely...
Given the number of high profile data breaches that occurred in 2016, it’s hard to believe that anyone would still be using obvious or insecure passwords. But that’s is what the latest survey from...
Improving technology and a social media habit are converging in an unfortunate way that is opening the door for a new kind of hacking. Now, not even your selfies are safe. Here’s what’s happening:...
In 2015, the FDA issued warnings about a pair of infusion pumps – “smart” medical devices that had demonstrated security flaws. It was the first time in history that security researchers demonstrated...
The spinning disk hard drive has been the reigning king of storage for almost as long as we’ve had desktop computers. All things end, though, and the HDD’s reign is officially coming to a close. It’s...
CVE Details is a website that tracks bugs in various software systems, aggregating the data and issuing an “award” for the software that has the most reported bugs in any given year. This year...
Privacy has been on the endangered species list for a while now, but the growing number of smart devices in people’s homes is putting an increasing amount of pressure on what little privacy remains...
Darren Cauthon, a software developer, got a Christmas present this year he didn’t ask for and didn’t want. On Christmas day, his family downloaded and installed an app on their Android-based LG Smart...
A very strange and disturbing case of the theft of protected health information has come from the New Hampshire Department of Health and Human Services (DHHS). The department recently reported on an...