BLOG
Many industry insiders consider physical security keys used in the context of two-factor authentication login schemes to be the final word in digital security. That is because even if your password is...
Clubhouse has taken the internet by storm. Or rather, it has taken the iOS ecosystem by storm, since the company has yet to release an Android version of their increasingly popular app. If...
One of the more disturbing trends this year is that worms are becoming popular among the hackers of the world again. We’ve seen a handful of new malware strains introduced in recent months with...
If you’re a Google Chrome user, and you’re interested in maximizing the overall performance of your system, then Google’s recent announcement about their browser is sure to make you...
When we think of cybercriminals, many of us conjure images of dark alley bad actors navigating the inner workings of the web to steal data, ruin reputations, and wreak havoc, all for a handsome...
If you rely on TCP port 554, you’ll probably want to do a bit of reconfiguration. Last year, security researchers discovered a new version of the NAT Slipstream vulnerability that allowed...
In early January of this year (2021), Microsoft informed security expert Brian Krebs that the company found four zero-day security flaws in their Exchange Server. Those flaws were actively being...
Recently, Microsoft made an announcement regarding the particulars of Windows Server 2022, and there’s a lot to like in terms of built-in protections. That is amazing, even if you’re not...
In terms of ransoms paid, Ryuk is the most successful strain of ransomware in use today, having netted an estimated $150 million for the group behind the malicious code. According to a recent report...