
BLOG
A lot of people have a complicated relationship with Adobe Acrobat reader. On the one hand, it’s an undeniably useful piece of software and one of the most widely installed and used on the...
Are you a gamer? Are you a fan of Resident Evil, Devil May Cry, Mega Man, Monster Hunter or Street Fighter? All of those games have something in common. All were developed by Capcom, a Japanese...
During the 2019 Microsoft Ignite convention, the company announced a new feature they were planning to add to Exchange Online. The new feature, dubbed “plus addressing” would give Office...
In September of this year, Microsoft announced that they would soon be releasing an optional update designed to remove the Adobe Flash Player from any machine applying the update, and rendering it...
If you’ve spent any time at all surveying the threat landscape, then you’re almost certainly familiar with the name Emotet. As one of the largest malware botnets on the planet, it’s...
Is your business in any way affiliated with or connected to the healthcare industry? If so, be advised that recently, the FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have...
Recently, one or more Amazon employees disclosed customer email addresses to an unknown third party, prompting Amazon to send a notification email out to impacted customers which reads as follows:...
Google does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification system is world-class. That said, no system is perfect, and that includes...
Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, expanding its reach for days, or even weeks before striking and locking your business...