BLOG
Are you a G-Suite user? If so, we have great news! Recently, Google rolled out a number of exciting new features to enhance both the usability of the G-Suite and its security. In the words of Javier...
A number of prominent hacking groups made a gentleman’s agreement with research labs that are attempting to develop a vaccine for the deadly COVID-19 virus currently ravaging the planet. The...
Do you have an Android phone? If so, be advised that there’s a new threat to be on the lookout for. The threat takes the form of a malware strain that’s being called BlackRock. It is a...
Do you own a pair of Amazon’s Echo Buds? If so, and in case you didn’t get an email from the company, be advised that Amazon recently discovered a potential safety risk. To address it, the...
An as-yet unidentified hacker pulled off quite a heist on Twitter recently. He (or she) gained access to a Twitter Admin account, and used that access to rapidly take control of a number of high...
In 2015, a new image format was born of a collaboration between Cisco, Google, and Xiph.org. Dubbed AVIF, the format is based on the Av1 video codec. It is royalty-free and widely regarded as the most...
If you aren’t normally in the habit of installing updates when companies release them, you’ll probably want to make an exception for KB4484439. It is a non-security update for Windows...
Do you use Microsoft Office 365? Do you also use Zoom? If so, be advised that there’s a new phishing campaign designed with you specifically in mind, the goal of which is to ultimately make off...
Although you may not be familiar with the name, a strain of ransomware called “Conti” is surging in popularity on the Dark Web and seeing a rapidly growing number of installations, so...