BLOG
Remember the Rowhammer vulnerability that made headlines around the world last year? 2019 saw all sorts of unusual threats, so if you’re struggling to recall the details of that one in...
Are you a Walgreens customer? Do you make use of the company’s mobile app, available for both Android and iOS devices? If so, be advised that the company recently disclosed a serious flaw in the...
It’s notoriously difficult to get reliable statistics on web browser usage. While there are sites that purport to track such things such as StatCounter and NetMarketShare, the numbers coming...
Are you a T-Mobile customer? If so, be advised, the company recently published a Notice of Data Breach on their website to inform all clients that an email vendor they utilize was hacked. The notice...
For the last couple of years, the primary means of communication when conducting phishing campaigns has been email. Phishing emails have been absolutely rampant. So much so that people are...
Unit 42 is a research division of Palo Alto Networks. Their researchers have discovered a sneaky and surprisingly effective phishing campaign that appears to have been launched in January of this year...
Unless you’re plugged into the world of social media, you may not realize it. There’s a war on, and until recently, it was a war that Facebook was losing. The war is being fought with...
Another week, another data breach. This time, the target being US clothing retailer J. Crew. The company announced that sometime in April of 2019, an unknown group of hackers utilized a credential...
Since 2010, Google has been doing its part to help keep its massive user base safe. They introduced a small but critical service called Google Authenticator, which is used by a number of online...