• Facebook
  • Twitter
  • LinkedIn
  • Google Plus
  • RSS

Blog

How Long Before You Experience A Cyber Attack?

According to this year's Traveler's Risk Index, published by The Traveler's Indemnity Company, a majority of business owners have a somewhat fatalistic view of hacking and data breaches. The index includes 52 ...

Firefox Adds Data Breach Monitoring Service 

Firefox is upping the ante where digital security is concerned, having just announced the release of a new, free service called 'Firefox Monitor.'  The new service is designed with one specific goal ...

Windows 10 Adoption Continues To Grow 

Windows 10 is far and away the fastest growing version of the OS in the company's history.  It recently hit an installation base of a staggering 700 million devices after about three ...

Bank Employee Steals Info On Over A Million Customers

Atlanta-based SunTrust Bank is the 12th largest bank in the US. They have a major problem, and so do roughly a million and a half of its customers.  According to CEO ...

Apple Recall Affects Some Macbook Pro Batteries

If you recently bought a 13-inch MacBook Pro (without a Touch Bar), you'll want to head to Apple's website.  The company didn't make a big announcement, but they've quietly introduced a ...

Researchers Find Major Vulnerabilities In Banking Apps

Do you do your banking online?  If so, there's bad news in the form of a report recently released by the security firm "Positive Technologies."   The company tested a variety ...

Major Server Ring Distributing Malware Taken Down

Score one for the good guys.  A researcher from BrilliantIT was recently able to figure out how infected computers would connect to EITest's command and control server, and using that information, ...

Hacked Routers Being Used To Spread Malware

Beware of compromised routers spreading malware.  This is according to both Kaspersky Labs and a recently released government report. Using hacked routers to spread malware is nothing new.  Security insiders have ...

Google Wants Children Watching YouTube Kids App

More often than not, Google is seen as a force for good on the internet. However, in one area in particular, their actions and words haven't been in alignment, and it's ...

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  ...

Be Careful, Searches May Provide False Download links

If you're downloading software from the web, be careful.  Take the extra step of verifying that you're on the developer's website, because the hackers have a new trick up their sleeve.  ...

Panera Bread Customer Accounts Exposed To Threats

Panera Bread company is the latest to find itself in hot water.  Recently, security researcher Dylan Houlihan discovered that the company had failed to encrypt (or otherwise protect) a file containing ...

No Spectre Fix For Certain Intel Processors

The bad news just doesn't seem to stop where Intel and the Speectre vulnerability are concerned.  The latest bit of news comes directly from Intel, as the company admits that it's ...

Contact Information

Contact

Terminal

Social Media

  • Facebook
  • Twitter
  • LinkedIn
  • Google Plus
  • RSS