BLOG
On paper, it seems like a lovely idea to use a public charger. Airports, hotels, and other high traffic areas have begun to increasingly offer public USB power charging stations to give people a...
Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the...
WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it’s got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no...
Microsoft recently published an important new support document relating to several Windows versions. The document reads, in part, as follows: “After you configure a Windows-based computer...
Office 365 has been the target of an increasing number of ongoing phishing scams. The latest scam involves using fake voicemail messages to convince targets that they need to log in to hear the full...
There is a new form of malware that you and your staff need to be aware of. That’s because it’s gaining in popularity among cyber criminals around the world. Known as ‘Racoon...
Do you have web domains registered with Web.com, Network Solutions or Register.com? If so, at least some of your data may have been compromised. Web.com recently reported that they and their two...
Has it been more than a month since you upgraded your Android OS? If so, you should make upgrading a priority. Just over a month ago, Google patched a critical flaw in the Android OS that allowed...
If you’re using Google’s Chrome browser to read this article, be advised that the company has announced the presence of a pair of major, Zero-Day vulnerabilities that put you at immediate...