BLOG
Have you been noticing “strange” search results when you’re surfing the web? Have your search results been taking longer than usual to appear? You may have been infected by a new, very clever bit of...
What percentage of total internet traffic would you estimate that bots (non-human visitors) account for? Twenty percent? Thirty percent? Unfortunately, according to data released by DeviceAtlas, a...
If you haven’t yet heard of “KeySweeper,” you have a new threat to be on the lookout for. The KeySweeper device is built with off the shelf, Arduino components. These can be programmed for a variety...
In recent months, Microsoft has made a number of very good, highly popular moves that have had its customers raving about its apparent change. This latest incident, however, isn’t one of those...
You’ve probably got either a dual- or quad-core computer sitting on your desk right now, but if you love bleeding edge technology, then you’re going to want to upgrade after reading this. Recently, at...
Security firm Duo Security recently published a disturbing report relating to laptop security. It found critical security flaws in laptops produced by five of the largest OEMs: Acer, Asus, Dell...
Most of us (and you know who you are) tend to be not-very-good when it comes to creating robust, secure passwords. If you’ve ever used your significant other’s birthday, your birthday, the word...
You’ve probably seen the joke email before. Something to the effect of, “If you don’t forward this message to six people within twenty-four hours, your teeth will fall out, your car will break down...
Not long ago, we learned that last year’s high profile LinkedIn hack was much bigger than initially thought. When the hack occurred, the company assured its user base that it was limited in scope to...