BLOG
Do you use Evernote Web Clipper for the Chrome web browser? If so, be advised that the developer recently reported that a critical flaw in the extension could allow hackers to access user information...
Researchers have recently discovered a pair of critical vulnerabilities in Alaris Gateway Workstations. These bring us closer to the tragic day when a hacker will actually be able to kill someone with...
Great news for inter-operability. Apple has brought their new iCloud app to the Microsoft Store for Windows 10 devices. Even better, the app is designed such that it’s deeply integrated with...
The recent hack of the American Medical Collection Agency (AMCA) is having ripple effects around the world. Recently it was reported that as a direct consequence of that hack, Quest Diagnostics (one...
Hackers are always on the lookout for new ways to freshen up time-tested techniques. Where time-tested techniques are concerned, few are older than the humble phishing email. In one form or another...
If you’re not familiar with the term, ‘Steganography’ is the term used to describe the act of hiding code in images and video. It’s a creative strategy that allows hackers to...
Microsoft recently updated their support page and offered additional guidance to network admins as it relates to Office 365’s built-in spam filters. The gist of the update is that they strongly...
Bad news for Android users. Recently, Google discovered that more than two hundred apps on the Play Store had been infected with the ‘BeiTaAd’ plugin. This plugin is the latest in a large...
It’s the end of an era. In 2001, Apple introduced iTunes, which transformed the music industry. For the first time ever, it was possible to buy individual songs, transfer files, and...