BLOG
A research team has found an exploit that allows hackers to decrypt and view encrypted files on a number of well-known SSD drives. They include: Samsung T5 Portable Samsung T3 Portable Samsung...
In recent months, hackers around the world have been finding new ways to invade people’s privacy, hijacking an increasing number of cameras and microphones attached to smartphones and PCs. ...
Intel just can’t seem to catch a break. By now, almost everyone has heard about the dreaded Spectre and Meltdown vulnerabilities which have been plaguing the chip maker since they were first...
Researchers have discovered a security flaw in MS Office 2016 and older versions that leave the door open to hackers who can take advantage of it to run malicious code on a target computer. This...
If you own Apple devices that use iOS, watchOS, tvOS, or macOS, there’s good news. The company just released major updates for all of those. They’re available right now, and here are a...
Earlier this year, Google introduced a new and improved Gmail that gave users virtually unlimited customization options. In addition to that, it included some exciting new AI-based features that cut...
Yahoo has the dubious honor of having been on the receiving end of the largest data breach in history. As a consequence, the company has recently agreed to pay $50 million in damages and provide free...
IBM has recently announced what is to be the largest open source acquisition in history. They’re buying Red Hat for a staggering $34 billion dollars. This, as the saying goes, changes...
Google is rolling out some important changes that will make it easier for people who use their services to control their data. They’re starting with their most widely used service, which is...