BLOG
Printing company MOO Labs has just brought the humble business card into the information age. Employing the same NFC (Near Field Communications) technology that makes it possible to make a credit card...
The unfortunate reality is that most instances of hacking occur from within a company itself. It’s true that the high profile cases that make the news are successful breaches from outside the company...
Do you trust what your eyes tell you? If you’re looking at a computer monitor, that trust might be misplaced. At a recent DEFCON presentation in Las Vegas, researchers demonstrated how it’s possible...
Does your company rely on Oracle Systems’ Micros to handle point of sale transactions? If so, you should change your password immediately. The company has recently reported that a sophisticated...
In late 2016 or early 2017, Bluetooth 5.0 will be released, and by all indications, this will be the version of the technology we’ve all been waiting for. It’s about to take a giant leap forward in...
Battery life for mobile devices is their single biggest weakness. The greatest challenge in growing and managing the exploding “Internet of Things” isn’t the devices themselves, but rather, the power...
Security researchers from Check Point have unearthed a new vulnerability dubbed QuadRoot that leaves potentially 900 million or more Android-based smartphones vulnerable. The attack manifests when a...
By now, it’s a familiar story. Conventional wisdom holds that you want to use a different password on every site or service you log into and that you want to change your passwords regularly, in order...
Ransomware has made some inroads into the realm of smart devices, but until quite recently, Android devices were the target of choice. That seems to be changing now. Increasingly, we’re seeing iPhone...