BLOG
Big changes are in the works for Apple’s venerable MacOS, as the company prepares for a future where the desktop OS shares increasing amounts in common with both iOS and iPadOS. A recent preview...
Recently, Microsoft’s Defender ATP Research Team issued guidance relating to defending against attacks that target Exchange servers. They are coming under increasing attack based on the latest...
Do you rely on Cisco’s Webex Meetings app for video conferencing? If so, be advised that the company found and addressed a pair of high severity security flaws that could allow hackers to...
Google recently published a blog post that didn’t get much attention, but that outlines a major change to the way the company’s video collaboration tool “Meet” works. The blog...
Tens of millions of workers have been forced to work from home as the COVID-19 virus rampages around the globe. That has naturally increased reliance on internet connectivity and disrupted a number of...
Microsoft hasn’t had great luck with its Windows 10 updates in recent months. Often, in their quest to improve the OS in one area, they inadvertently break something else. The company’s...
Rumors were recently swirling around cellphone carrier T-Mobile. Fears were running rampant that a massive DDOS attack may be underway on the heels of a major outage. The rumors spread like wildfire...
Tech companies both big and small are always looking for new ways to protect their customers from the threat of malware.While that’s not something that hardware vendors are known for, Intel has...
Do you use the VLC Media Player to watch downloaded movies and other videos? If so, be aware that researchers have discovered a serious security flaw in the code that allows for remote code execution...