BLOG
It’s been a busy week at Oracle. The company has recently released a massive flurry of patches that fix a staggering 136 security issues for a wide range of the products it sells. This release comes...
Last year, an IoT (Internet of Things) security firm called Bastille Networks uncovered an attack from an unexpected vector. Hackers can actually take control of your wireless mouse, which has no...
Are you still using single factor authentication in your business? If so, you are taking an unnecessary risk. If the only thing standing between the hacking community and your company’s data is a...
Toy manufacturing giant Mattel was recently the target of a whaling scam that could have been both highly embarrassing and extremely costly, if not for a single stroke of luck. If you’ve not heard the...
More problems for the Adobe Flash player, and a new type of hacking attack that security experts are referring to as “Typosquatting.” If you’ve not yet heard the term, you’re not alone, but you can...
If you have Apple QuickTime installed on a Windows-based PC, you should uninstall it immediately. In a public statement issued on 4/14/2016, the US-CERT recommends the removal of QuickTime for...
The statistics are both shocking and dismaying. Even in the face of innumerable high profile data breaches, people still aren’t serious about personal data security. In fact, a shocking 95% of people...
“What’s old is new again.” The simple truth is that tastes and trends seem to repeat. We’ve seen it countless times in the world of fashion, and now, we’re seeing something similar in the hacking...
The hacking community seems to have found another viable business model, this time, in the form of ransomware. Given the success that hackers have been finding with this type of attack lately, they’ve...