Data Breaches On The Rise – Customers Are Blaming Breached Companies
The year of 2016 saw more high-profile data breaches than at any time in the history of the internet. 2017 stands to break the record. With data breaches on the
Insights and tips to keep your IT ahead of the curve
The year of 2016 saw more high-profile data breaches than at any time in the history of the internet. 2017 stands to break the record. With data breaches on the
If you’re somewhat slow to adopt cutting edge technology, you may well still be using a phone that’s on an old 2G Network. If that’s the case, you should know
Another day, another type of smart device proven vulnerable to hacking. In this case, the latest IoT (Internet of Things) devices to fall victim are Samsung SmartCam cameras. These cloud-enabled
Security researchers have recently discovered an odd strain of malware they’ve dubbed “Fruitfly,” which has been specifically targeted at biotech companies. It would be a mistake to call this a
The YouTube sensation “EverythingApplePro” has a reputation for finding odd bugs and exploits in iPhones and iPads. A newly added pair of videos on the channel’s page reveals two quirky
Recently, Consumer Reports did something they have literally never done before. They failed to recommend the latest Apple laptop (the MacBook Pro) for purchase. The reason? When they conducted a
By now, almost everyone is aware that Adobe Systems’ Flash Player is in trouble. Critical security issues are being reported faster than the company can fix them, but kudos to
Given the number of high profile data breaches that occurred in 2016, it’s hard to believe that anyone would still be using obvious or insecure passwords. But that’s is what
Improving technology and a social media habit are converging in an unfortunate way that is opening the door for a new kind of hacking. Now, not even your selfies are
In 2015, the FDA issued warnings about a pair of infusion pumps – “smart” medical devices that had demonstrated security flaws. It was the first time in history that security
The spinning disk hard drive has been the reigning king of storage for almost as long as we’ve had desktop computers. All things end, though, and the HDD’s reign is
CVE Details is a website that tracks bugs in various software systems, aggregating the data and issuing an “award” for the software that has the most reported bugs in any