
Zombieload V2 Is Back To Wreak Havoc
Zombieload V2 is here. First discovered in May of this year, it was described as a successor to the infamous Meltdown attack. That was a data-leaking side-channel vulnerability that impacted
Insights and tips to keep your IT ahead of the curve

Zombieload V2 is here. First discovered in May of this year, it was described as a successor to the infamous Meltdown attack. That was a data-leaking side-channel vulnerability that impacted

Social media has been at the center of several high-profile political dramas of late. The major platforms came under fire for not doing enough to monitor political ads and other

There’s a new and unusual ransomware strain making the rounds that you should be aware of. Called ‘AnteFrigus,’ it is primarily distributed via ‘malvertising’ that redirects users to the RIG

It appears that Microsoft is getting rid of its Cortana App in several countries due to security concerns. With more than 141 million monthly users, this will have a significant

In case you weren’t already aware, Disney recently launched a new video streaming service called Disney+, driving Netflix and other established streaming services crazy with fear and apprehension. Disney’s support

Google recently found itself in hot water with corporate IT administrators for rolling out a feature designed to help prolong battery life. The new feature accomplished its mission, but it

Do you have an Android device? Is it built with Qualcomm chips? If so, be advised that you may be at risk. According to a report recently published by security

On paper, it seems like a lovely idea to use public chargers. Airports, hotels, and other high traffic areas have begun to increasingly offer public USB power charging stations to

Researchers at Proofpoint have found evidence of a malicious campaign threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it’s got a giant bullseye on it where hackers are taking advantage of remote code execution attacks

Microsoft recently published an important new support document relating to several versions of Windows servers. The document reads, in part, as follows: “After you configure a Windows-based computer to use

Office 365 has been the target of an increasing number of ongoing phishing scams using fake voicemail to lure people. The latest scam involves using fake voicemail messages to convince