blog

BLOG

Android Malware Could Access Your Pictures And Calls

Android users have a new threat to contend with, according to a sixteen-page whitepaper outlining a new malware strain. The paper was published by a group of security researchers working for...

Survey Shows Teens Are Concerned About Their Screen Time

According to a recent survey conducted by Pew Research Center, 54 percent of teens say that they spend too much time on their cellphones. Acknowledging you have a problem is the first, necessary step...

Encrypted Chats Are Now Available In Skype

Earlier this year, Microsoft announced that it had entered into a partnership with Open Whisper Systems, the makers of the Signal app.   The purpose of the partnership was to bring Signal’s open...

Gmail Releases New Confidential Mode 

Google has introduced a new Gmail feature called “Confidential Mode,” which seeks to make sending and receiving important or sensitive emails more secure.  Unfortunately, it may have...

If You Use Photoshop, Update Immediately

Do you use Photoshop? Does anyone who works for you use it?  If so, you’ll want to apply the latest security patch immediately. Two new vulnerabilities were discovered after the release of...

New Intel Vulnerability Named Foreshadow Found

Intel has had a tough time of things so far this year.  The most recent trouble stems from yet another newly discovered security flaw in the company’s processors, bearing the inelegant name of...

Macs Can Be Hacked With Synthetic Dismissal On Warning Boxes

Depending on the lens you view him through, Patrick Wardle (former hacker for the NSA and macOS security expert) is either your best friend or your worst nightmare. Most people (whether fans of Apple...

Fax Machines Might Be Gateway To Next Hacker Attack

Nothing bad could possibly happen to your company’s network if the only piece of information the hackers have is your fax number, right? Unfortunately not, according to recent research by...

Cortana May Have Flaw Allowing Unauthorized System Access 

Researchers at McAfee have demonstrated a method that hackers could use to perform an end-run around Cortana and access data, run malicious code, or even change a locked computer’s password.  In...