BLOG
Unless your firm is directly connected to the banking industry, you may not be aware of this, but the biggest ATM-related crime that banks have to grapple with is ATM Skimming. It has become a major...
There’s a new attack vector to be worried about called “Windtalker.” It allows a hacker to take control of a WiFi hotspot and reverse-engineer keystrokes made by users who are typing via their...
If recent events are any indication, Botnets are going to be in the news a lot more in coming months. Less than a month ago, a massive army of hacked internet devices broke records when it attacked a...
The year of 2016 continues to break new records in terms of massive security breaches. According to LeakedSource, last month, hackers gained access to the FriendFinder Network, which includes the...
If you own your own business, then odds are good that you’ve taken advantage of the “Sign in With Facebook” (or Google) API. It’s fast, it’s convenient and it’s one less thing to worry about. It gives...
Back in the good ol’ days before the rise of the iPhone, Apple devices were largely considered to be more secure than their Wintel counterparts. There was a time when Apple used this as a major plank...
Internet Explorer is widely regarded as one of the most security riddled browsers in the history of the internet. Microsoft had hoped that with the release of Windows 10, which included a complete...
It’s amazing how pervasive WiFi has become. These days, it’s hard to imagine life without it. The internet is everywhere. It’s always on, and you’re always connected. Unfortunately, as speeds have...
So far as is known, no hacking attack to date has resulted in death, but the day is inevitably coming. One day in the not-too-distant future, a hacker will be charged with murder, in addition to their...