BLOG
Do you use an Android App called ‘WiFi Finder’? If so, be advised that your network password has likely been exposed, based on research conducted by Sanyam Jain, of the GDI Foundation...
Do you frequent the website bodybuilding.com? If so, be advised that the site has been breached. According to a recent statement by the company behind the site, the breach occurred in February, 2019...
Industry experts have been predicting the death of the humble password for decades. To date, those predictions have amounted to nothing. Passwords are still with us, and still serve as the...
Microsoft recently issued an important support document that your IT staff needs to be aware of. In part, their notice reads as follows: “Inappropriate drive reassignment can occur on eligible...
Back in July 2017, Microsoft created a bit of an uproar when they released a build of Windows 10 that promoted their new Paint 3D app. Paired with the new arrival was an announcement that the classic...
The venerable banking Trojan known as Q-bot is back in the news, having recently been spotted in the wild as part of a sophisticated new phishing campaign designed to claim a new generation of...
Apple recently made an update to their XProtect antivirus software, which is the company’s built-in means of protecting Macs from virus threats. Patrick Wardle is one of the best-known Mac...
According to FBI statistics, in 2013 there were 991 tracked incidents of ransomware attacks against business, resulting in losses slightly exceeding half a million dollars. The number of incidents...
Twitter recently announced the addition of a new “Hide Replies” feature, which will give the platform’s users a bit more control over conversations that stem from the tweets they...