
BLOG
Researchers have discovered a devilishly clever new stain of malware currently in use by hackers around the world. The new strain is appropriately called “Lucifer,” and has been making...
Eleven years ago, Microsoft embarked on a bold experiment to emulate Apple. They opened a number of brick and mortar retail stores. Unfortunately, their stores never caught on quite the same way that...
Big changes are in the works for Apple’s venerable MacOS, as the company prepares for a future where the desktop OS shares increasing amounts in common with both iOS and iPadOS. A recent preview...
Recently, Microsoft’s Defender ATP Research Team issued guidance relating to defending against attacks that target Exchange servers. They are coming under increasing attack based on the latest...
Do you rely on Cisco’s Webex Meetings app for video conferencing? If so, be advised that the company found and addressed a pair of high severity security flaws that could allow hackers to...
Google recently published a blog post that didn’t get much attention, but that outlines a major change to the way the company’s video collaboration tool “Meet” works. The blog...
Tens of millions of workers have been forced to work from home as the COVID-19 virus rampages around the globe. That has naturally increased reliance on internet connectivity and disrupted a number of...
Microsoft hasn’t had great luck with its Windows 10 updates in recent months. Often, in their quest to improve the OS in one area, they inadvertently break something else. The company’s...
Rumors were recently swirling around cellphone carrier T-Mobile. Fears were running rampant that a massive DDOS attack may be underway on the heels of a major outage. The rumors spread like wildfire...