BLOG
IoT startup Trillbit has a big idea with profound implications for the Internet of Things, and by extension, for all of us. The company is currently designing a system called “Trill...
It’s no secret that ransomware attacks have been on the rise over the last couple of years. Many companies, desperate to get their files back, have resorted to simply paying the ransom and...
Apple doesn’t tend to share well with other corporations, but they have made a few efforts to expand their services to the platforms of their competitors. You can, for instance, download Apple...
Most people use Google Chrome. In fact, according to the latest statistics, Chrome has more than half the browser market share, with the rest dividing the smaller portion of the market between them. ...
Have you ever created an account on Dell’s website to purchase computer equipment? If so, your account may have been compromised. As a precaution, Dell has forced password resets for every...
In recent months, security researchers have unearthed all sorts of new hardware vulnerabilities. Several of them allow hackers to quietly assume control of your PC’s built-in camera or...
Microsoft just won a huge military contract worth $480 million to bring 100,000 customized AR (Augmented Reality) headsets, based on their HoloLens technology, to the US Army. The army’s plan is...
Akamai has discovered a nasty new hack that’s allowing cybercriminals to move beyond simply compromising routers, but also, in some instances, to use the compromised routers to take control of...
Bob Diachenko, the Director of Cyber Risk Research for Hacken, recently made a disturbing discovery. He found an ElasticSearch server open and vulnerable on the internet, without so much as a...