BLOG
Another week, another critical security flaw in Adobe Flash. This one isn’t quite as bad as the flaw found last year, but it’s close. If you haven’t been following the trials and tribulations of...
In recent months, Apple has been increasingly on the receiving end of unwanted attention from the hacking community. Apple’s OS offerings have long been touted as being more robust and secure than...
If you haven’t heard the term “whaling attack,” as it relates to the hacking community, you’re not alone. It’s a fairly recent phenomenon, and is a subset of the standard phishing attack, where...
One of the nation’s largest firms engaged in assisting other companies in dealing with data breaches has now confirmed that they themselves have suffered a data breach, this one affecting 1.5 million...
One of the worst things about taking business trips is the airplane WiFi. It’s a lesson in patience. More often than not, owing to the slow speeds and anemic bandwidth available, you’re better off not...
File this one away under things not to do. Not that you’d ever have a need to do this, but whatever you do, do not set your iPhone’s date to January 1, 1970. If you do, you stand a good chance of...
The short answer to the question posed by this article’s title is yes. Yes, your smart TV is listening to your personal conversations. It’s simply a part of the way the technology works. If you spend...
Is nothing safe from the hacking community? It seems as though everything is under assault these days. Antivirus and malware blocking software is struggling to keep pace. When those security holes get...
MasterCard has been experimenting with a new facial biometrics app, and is poised to roll it out in force later this year. The basic idea behind the technology is that it will employ facial...