BLOG
Do you use the photography network 500PX? If so, be advised that it has been breached by hackers. If you were a 500PX user on or before July 5, 2018, you are among the impacted users. The company...
Linux users, beware of the security flaw known as “Dirty Sock” and identified as CVE-2019-7304. This critical security flaw was discovered by security researcher Chris Moberly, who...
In 2015, macOS Security Expert Patrick Wardle reported an almost shockingly simple method hackers could employ to get around the Mac Gatekeeper system, which is the first line of defense against...
America might run on Dunkin’, but the company has just taken another big hit. For the second time in recent months, hackers have gained access to an unknown number of DD Perks user accounts...
If you’re like most people, the GPS function on your smartphone has become the one feature you use and value more than any other. Few people these days can even remember what life was like...
Apple CEO Tim Cook has been busy. Knowing that his company has little chance of dramatically increasing their market share in an increasingly saturated field for handheld devices, they’ve...
How much does a successful ransomware attack cost a victim on average? The numbers will terrify you. Based on the latest statistics compiled by Coveware, each incident of a compromised computer costs...
A small but growing number of people have been making the switch to MS Office clones like Apache’s OpenOffice and LibreOffice. The thinking is that they can get the same core functionality but...
Skype is introducing a new feature to its video call service that users have been asking about for quite some time now. Background blur. If you regularly make video calls, you’ve probably been...