BLOG
More and more business are migrating increasing amounts of data to the cloud. That’s generally seen as a good thing, but there’s a fly in the ointment. The cloud, which is regarded by many to be safer...
If you have a Samsung desktop or laptop and are still running some version of Windows 7, hold off on upgrading, at least for now. Despite having more than two years to get their drivers in order, the...
Another month, another Flash vulnerability. This time, it’s designated as CVE-2016-4171 (details here: https://helpx.adobe.com/security/products/flash-player/apsa16-03.html ). This is yet another...
TeamViewer, the company behind a popular remote desktop platform, which allows users to share their screens, access their computers remotely, or participate in online conferences, has been...
Online security company Check Point Software Technologies has discovered a flaw in Facebook’s chat app that allows hackers to log in and change the content of chat messages (individual messages or...
The push toward ever greater miniaturization has been present in the technology industry from the very beginning. Computers that once occupied whole rooms got small enough to fit onto any available...
Your employees are both your company’s greatest asset and your biggest potential security risk. In a recent study conducted by Experian Data Breach Resolution and Ponemon Institute, it was found that...
If you’re one of the millions of users with an Android phone, then you already know there are a couple of different ways you can find it if you happen to misplace it. You can use the built-in search...
Have you been noticing “strange” search results when you’re surfing the web? Have your search results been taking longer than usual to appear? You may have been infected by a new, very clever bit of...