BLOG
Hackers are constantly on the lookout for new ways of causing mayhem and stealing data. Recently, researchers have unearthed a new technique to be on guard against. A few hackers have begun embedding...
Does your company make use of VMware products? If so, be advised that a pair of researchers from Synacktiv recently reported a series of critical security flaws in VMware’s ESXi, Workstation and...
If you have computers on your corporate network that rely on NVIDIA hardware and software, be advised that the company recently released security updates to address serious security vulnerabilities...
Researchers have discovered a devilishly clever new stain of malware currently in use by hackers around the world. The new strain is appropriately called “Lucifer,” and has been making...
Eleven years ago, Microsoft embarked on a bold experiment to emulate Apple. They opened a number of brick and mortar retail stores. Unfortunately, their stores never caught on quite the same way that...
Big changes are in the works for Apple’s venerable MacOS, as the company prepares for a future where the desktop OS shares increasing amounts in common with both iOS and iPadOS. A recent preview...
Recently, Microsoft’s Defender ATP Research Team issued guidance relating to defending against attacks that target Exchange servers. They are coming under increasing attack based on the latest...
Do you rely on Cisco’s Webex Meetings app for video conferencing? If so, be advised that the company found and addressed a pair of high severity security flaws that could allow hackers to...
Google recently published a blog post that didn’t get much attention, but that outlines a major change to the way the company’s video collaboration tool “Meet” works. The blog...