BLOG
Recently, Microsoft’s Defender ATP Research Team issued guidance relating to defending against attacks that target Exchange servers. They are coming under increasing attack based on the latest...
Do you rely on Cisco’s Webex Meetings app for video conferencing? If so, be advised that the company found and addressed a pair of high severity security flaws that could allow hackers to...
Google recently published a blog post that didn’t get much attention, but that outlines a major change to the way the company’s video collaboration tool “Meet” works. The blog...
Tens of millions of workers have been forced to work from home as the COVID-19 virus rampages around the globe. That has naturally increased reliance on internet connectivity and disrupted a number of...
Microsoft hasn’t had great luck with its Windows 10 updates in recent months. Often, in their quest to improve the OS in one area, they inadvertently break something else. The company’s...
Rumors were recently swirling around cellphone carrier T-Mobile. Fears were running rampant that a massive DDOS attack may be underway on the heels of a major outage. The rumors spread like wildfire...
Tech companies both big and small are always looking for new ways to protect their customers from the threat of malware.While that’s not something that hardware vendors are known for, Intel has...
Do you use the VLC Media Player to watch downloaded movies and other videos? If so, be aware that researchers have discovered a serious security flaw in the code that allows for remote code execution...
Claire’s Jewelry and Accessories is the latest company to fall victim to hackers. According to a recent disclosure made by the company, both the retail giant’s main website, and the...