BLOG
Are you a T-Mobile customer? If so, be advised, the company recently published a Notice of Data Breach on their website to inform all clients that an email vendor they utilize was hacked. The notice...
For the last couple of years, the primary means of communication when conducting phishing campaigns has been email. Phishing emails have been absolutely rampant. So much so that people are...
Unit 42 is a research division of Palo Alto Networks. Their researchers have discovered a sneaky and surprisingly effective phishing campaign that appears to have been launched in January of this year...
Unless you’re plugged into the world of social media, you may not realize it. There’s a war on, and until recently, it was a war that Facebook was losing. The war is being fought with...
Another week, another data breach. This time, the target being US clothing retailer J. Crew. The company announced that sometime in April of 2019, an unknown group of hackers utilized a credential...
Since 2010, Google has been doing its part to help keep its massive user base safe. They introduced a small but critical service called Google Authenticator, which is used by a number of online...
A few years ago, the people who track such things announced that the PC had been dethroned. They said a slight majority of people were turning to their phones as their primary means of accessing the...
Photos are a new kind of currency, and gaining in value. Clearview AI is a facial recognition startup used by hundreds of law enforcement agencies around the country. The company was hacked, giving...
Every kid who grew up watching sci-fi has dreamed of the day when a Universal Translator would be available, making seamless communication possible and eliminating the language barrier entirely. That...