BLOG
Security researchers from Check Point have unearthed a new vulnerability dubbed QuadRoot that leaves potentially 900 million or more Android-based smartphones vulnerable. The attack manifests when a...
By now, it’s a familiar story. Conventional wisdom holds that you want to use a different password on every site or service you log into and that you want to change your passwords regularly, in order...
Ransomware has made some inroads into the realm of smart devices, but until quite recently, Android devices were the target of choice. That seems to be changing now. Increasingly, we’re seeing iPhone...
In fact, your Microsoft Account Credentials are almost certainly vulnerable, but until the rise in popularity of Windows 10, it hasn’t been nearly as big an issue as it is today. The unfortunate...
USB drives. They’re ubiquitous. They’re everywhere. You probably have several floating around your office, or nearby. We tend to use them so often that we don’t even think about it, and that’s a...
If you have a Yahoo email account, you’re not alone. The company is one of the largest free email account providers on the internet, which unfortunately means that when they suffer a data breach, it...
Banner Health, based in Phoenix, AZ, has the dubious honor as having been the recipient of the largest healthcare related data breach so far in 2016. The cyberattack was launched on June 17, and...
Does your company currently have a formal email policy? If you don’t, you need one, and sooner, rather than later. As the first “killer app” in the world of computing, email is, to this day, one of...
In recent months, we’ve seen an upsurge in the number of attacks that have been executed by exploiting wireless peripherals attached to computers. Hackers can even intercept signals sent to your PC...