blog

BLOG

Would Your Company Fail A Web Security Test?

How solid is your firm’s web security? According to recent findings by the penetration expert Ilia Kolochenko, probably not very good. Kolochenko should know. He is the CEO of High-Tech Bridge, and he...

Will Your Next Hard Drive Be MRAM?

There’s a new technology in the area of memory and storage. MRAM. If you haven’t heard of it, you’re not alone, but it’s one of two promising up and coming technologies that stand to change the...

Need More Laptop Drive Space? How About A 4TB SSD?

Samsung made a surprising new product offering with little fanfare. There was so little fanfare, in fact, that you may have missed it. The company is now selling a staggering 4TB SSD with a 2.5 inch...

Will Printers Serve Up Your Next Computer Infection?

Vectra Networks has found an old, longstanding vulnerability in Windows, and it comes from a rather unexpected source. Printers. Way back in 2007, an eternity ago in the world of tech, Microsoft...

Latest Breach Hits Omni Hotels – Has Information Been Stolen?

By now, the headlines will scarcely surprise anyone. Yet another business has suffered a major data breach. This time, it was Omni Hotels, a luxury hotel chain. The breach, which was discovered on May...

Thieves Are Using Technology To Hack In And Steal Cars

The world’s hackers are branching out. No longer content to simply breach the digital fortresses that today’s businesses and governments have become, they’re now beginning to turn their attention to...

Mac Is The Focus of New Malware

In the old days, before the rise of the iPad and iPhone, hackers were mostly content to leave Apple alone. They had such a tiny slice of the computer market that it was generally deemed as being more...

Identity Thieves Use Social Media To Gain Personal Information

Identity theft is a large, pervasive, and growing problem. In fact, statistics show that the instances of identity theft jumped a staggering 57% last year alone, this, according to figures from the...

Android Users Infected By Malware Threat Known As Hummingbad

Most people engaged in legitimate business have no idea just how profitable hacking can be. Hummingbad is a case in point. Part of the “Hummer” family of Trojans, this bit of malware is the most...