BLOG
Google is about to change the game where the Internet of Things (IoT) is concerned. Recently, the company announced the release of Android Things, an operating system specifically designed for...
Yet more critical security flaws have been found in Adobe’s poor, beleaguered Flash Player. The company continues to fight gamely to keep pace, patching issues as quickly as they are found, but there...
This is a world record, although the honor of holding it is a dubious one. Yahoo recently announced that it was the victim of the largest data breach of all time, in which more than one billion user...
If you haven’t heard of a Trojan called Tordow, you probably will soon. Security researchers have been aware of it since February of this year, but recently, researchers from Comodo Security have...
Microsoft made a mistake, and it could complicate your life. If you’ve got your computer set up to receive automatic updates, you may have suddenly found yourself unable to connect to the internet...
If you use a Mac, and you have a Skype account, you could be at risk. A previously undiscovered backdoor was recently found by researchers at SpiderLabs that would allow any moderately skilled hacker...
Do you use Instagram as part of your company’s marketing efforts, or to keep tabs on the competition? If so, the company has rolled out an exciting new feature you’re sure to love: the ability to save...
There’s a new phishing email making the rounds that your firm needs to be aware of if you deal with protected health information (PHI) in any way and are subject to HIPAA rules and regulations. The...
Cybercrime is growing up. Increasingly, on the Dark Web, customers can find a wide variety of hacking activities offered as a “service.” There is everything from DDOS attacks launched by massive...