BLOG
One of the unfortunate truths about apps is that many developers use deceptive practices to try and confuse consumers. They try to mislead them about how much custom features cost and when in-app...
In the world of hacking, steganography ranks as one of the most difficult methodologies to detect. If you’re not familiar with the term, it is the practice of embedding executable code inside...
Google has kept no secret of their plan to eventually put an end to their social media experiment, Google+. In case you haven’t been keeping abreast of the company’s announcements where...
On paper, UltraViolet seemed like a great idea. It was (and still is, for the moment) a service that stored your license information for various digital media you purchased. You could buy a movie...
The first browser update of 2019 is officially out. Both Google’s Chrome and Mozilla’s Firefox browsers are getting a raft of security fixes that will help make Mac, Linux and Windows...
Apple’s latest iOS release contained a feature that wowed and excited its massive user base. Group FaceTime. It was heralded as ‘the next Big Thing’ in the Apple ecosystem...
When was the last time you conducted a company wide audit on all the software running on all the machines tied to your firm’s network? If you’re not sure the answer to that question...
There’s a new strain of ransomware making the rounds, and it’s a nasty piece of work. Called Phobos by its creators, the latest threat on the ransomware scene first made an appearance in...
If you’re like many seasoned ‘Netizins, you probably rely on some type of VPN to help ensure your digital privacy. Unfortunately, based on research conducted by Simon Migliano, you could...