BLOG
How solid is your firm’s web security? According to recent findings by the penetration expert Ilia Kolochenko, probably not very good. Kolochenko should know. He is the CEO of High-Tech Bridge, and he...
There’s a new technology in the area of memory and storage. MRAM. If you haven’t heard of it, you’re not alone, but it’s one of two promising up and coming technologies that stand to change the...
Samsung made a surprising new product offering with little fanfare. There was so little fanfare, in fact, that you may have missed it. The company is now selling a staggering 4TB SSD with a 2.5 inch...
Vectra Networks has found an old, longstanding vulnerability in Windows, and it comes from a rather unexpected source. Printers. Way back in 2007, an eternity ago in the world of tech, Microsoft...
By now, the headlines will scarcely surprise anyone. Yet another business has suffered a major data breach. This time, it was Omni Hotels, a luxury hotel chain. The breach, which was discovered on May...
The world’s hackers are branching out. No longer content to simply breach the digital fortresses that today’s businesses and governments have become, they’re now beginning to turn their attention to...
In the old days, before the rise of the iPad and iPhone, hackers were mostly content to leave Apple alone. They had such a tiny slice of the computer market that it was generally deemed as being more...
Identity theft is a large, pervasive, and growing problem. In fact, statistics show that the instances of identity theft jumped a staggering 57% last year alone, this, according to figures from the...
Most people engaged in legitimate business have no idea just how profitable hacking can be. Hummingbad is a case in point. Part of the “Hummer” family of Trojans, this bit of malware is the most...