BLOG
Wormable bugs are an ongoing concern for Microsoft. Recently, the company released a set of patches for two newly discovered ‘BlueKeep-Like vulnerabilities” that impact a wide range of...
Do you employ a biometric security solution at your company to control building access? If your solution employs BioStar 2 technology (which is often integrated into third-party systems such as...
A security researcher known as “_MG_” on Twitter has invented a modified Apple Lightning cable that could allow a hacker to remotely access any Mac computer using them. He demonstrated...
Being more of a nuisance than anything, adware doesn’t see as many innovations as other forms of malware. Once in a while, an adware developer surprises the security researchers. That happened...
Researchers at CheckMarx recently discovered some serious security flaws in the popular LeapPad Ultimate tablet. The tablet was designed by LeapFrog to provide kids in the UK and Europe with a safe...
Grim news comes out of Russia, as reported by Microsoft. The tech giant has been tracking the activities of a Russian hacking group that goes by the name of Strontium. Their other names include APT28...
Hardly a week goes by that we don’t see another major data breach making the headlines. The latest company to fall victim to hackers is CafePress. They are well-known on the internet for...
Not long ago, both Google and Apple found themselves in hot water when it came to light that both companies had been making use of third-party partners to review Siri recordings. As the companies...
Apple has partnered with Goldman Sachs and their long-awaited “Apple Card” begins rolling out in limited fashion. The card becomes available to all iPhone owners in the United States...