Be Careful: Fake Apps Are Stealing Information
Security researchers at the firm ESET have recently warned of a total of 8 apps found on the Google Play store. These apps, at first glance, appear to be designed
Insights and tips to keep your IT ahead of the curve
Security researchers at the firm ESET have recently warned of a total of 8 apps found on the Google Play store. These apps, at first glance, appear to be designed
Last July, Android users got a nasty surprise. The surprise came in the form of a new type of attack directed against smartphones. Dubbed “Stagefright,” it allowed a hacker to
How solid is your firm’s web security? According to recent findings by the penetration expert Ilia Kolochenko, probably not very good. Kolochenko should know. He is the CEO of High-Tech
There’s a new technology in the area of memory and storage. MRAM. If you haven’t heard of it, you’re not alone, but it’s one of two promising up and coming
Samsung made a surprising new product offering with little fanfare. There was so little fanfare, in fact, that you may have missed it. The company is now selling a staggering
Vectra Networks has found an old, longstanding vulnerability in Windows, and it comes from a rather unexpected source. Printers. Way back in 2007, an eternity ago in the world of
By now, the headlines will scarcely surprise anyone. Yet another business has suffered a major data breach. This time, it was Omni Hotels, a luxury hotel chain. The breach, which
The world’s hackers are branching out. No longer content to simply breach the digital fortresses that today’s businesses and governments have become, they’re now beginning to turn their attention to
In the old days, before the rise of the iPad and iPhone, hackers were mostly content to leave Apple alone. They had such a tiny slice of the computer market
Identity theft is a large, pervasive, and growing problem. In fact, statistics show that the instances of identity theft jumped a staggering 57% last year alone, this, according to figures
Most people engaged in legitimate business have no idea just how profitable hacking can be. Hummingbad is a case in point. Part of the “Hummer” family of Trojans, this bit
Security researchers from Cisco’s Talos Group have discovered a huge and disturbing spike in spam emails containing a widely used ransomware called Zepto. In fact, the team has uncovered 137,731