BLOG
Online security company Check Point Software Technologies has discovered a flaw in Facebook’s chat app that allows hackers to log in and change the content of chat messages (individual messages or...
The push toward ever greater miniaturization has been present in the technology industry from the very beginning. Computers that once occupied whole rooms got small enough to fit onto any available...
Your employees are both your company’s greatest asset and your biggest potential security risk. In a recent study conducted by Experian Data Breach Resolution and Ponemon Institute, it was found that...
If you’re one of the millions of users with an Android phone, then you already know there are a couple of different ways you can find it if you happen to misplace it. You can use the built-in search...
Have you been noticing “strange” search results when you’re surfing the web? Have your search results been taking longer than usual to appear? You may have been infected by a new, very clever bit of...
What percentage of total internet traffic would you estimate that bots (non-human visitors) account for? Twenty percent? Thirty percent? Unfortunately, according to data released by DeviceAtlas, a...
If you haven’t yet heard of “KeySweeper,” you have a new threat to be on the lookout for. The KeySweeper device is built with off the shelf, Arduino components. These can be programmed for a variety...
In recent months, Microsoft has made a number of very good, highly popular moves that have had its customers raving about its apparent change. This latest incident, however, isn’t one of those...
You’ve probably got either a dual- or quad-core computer sitting on your desk right now, but if you love bleeding edge technology, then you’re going to want to upgrade after reading this. Recently, at...