Amazon Echo Data Called Upon In Criminal Case
Privacy has been on the endangered species list for a while now, but the growing number of smart devices in people’s homes is putting an increasing amount of pressure on
Insights and tips to keep your IT ahead of the curve
Privacy has been on the endangered species list for a while now, but the growing number of smart devices in people’s homes is putting an increasing amount of pressure on
Darren Cauthon, a software developer, got a Christmas present this year he didn’t ask for and didn’t want. On Christmas day, his family downloaded and installed an app on their
A very strange and disturbing case of the theft of protected health information has come from the New Hampshire Department of Health and Human Services (DHHS). The department recently reported
Microsoft has been hard at work experimenting with various ways to optimize performance. One of the most recent experiments to come to light is the advent of “Windows Gaming Mode.”
File this one away under “it should go without saying, but…” One of the most amazing and disheartening aspects of internet use is that after all this time, a shocking
The government is taking a more active hand in establishing security protocols for at least one part of the Internet of Things. Specifically, new guidelines are being drafted by the
Hardly a week goes by that a new exploit or attack vector doesn’t come to light that your IT staff has to try to defend against. The most recent threat
If you use Netgear routers in your home or office network, you should be aware of the latest security threat. The company has confirmed that three lines of its routers
Super Mario Run is taking the internet by storm and has replaced Pokemon Go as the hottest app on the market today. It’s so popular that many Android users, eager
The fortunes of Mozilla’s Firefox browser continue to improve thanks to the company’s ongoing efforts to improve their product. With Microsoft Edge hemorrhaging users at a record pace, Firefox has
If you have never heard the term “steganography,” you’re not alone. It’s the art and science of hiding code inside image data. When used by hackers, it is one of
Do you use any sort of Thunderbolt device on your Mac? If you do, and you haven’t been keeping your OS up to date, you’ll definitely want the latest security