Devices Attached To Corporate Networks Are Being Targeted
Grim news comes out of Russia, as reported by Microsoft. The tech giant has been tracking the activities of a Russian hacking group that goes by the name of Strontium.
Insights and tips to keep your IT ahead of the curve
Grim news comes out of Russia, as reported by Microsoft. The tech giant has been tracking the activities of a Russian hacking group that goes by the name of Strontium.
Hardly a week goes by that we don’t see another major data breach making the headlines. The latest company to fall victim to hackers is CafePress. They are well-known on
Not long ago, both Google and Apple found themselves in hot water when it came to light that both companies had been making use of third-party partners to review Siri
Apple has partnered with Goldman Sachs and their long-awaited “Apple Card” begins rolling out in limited fashion. The card becomes available to all iPhone owners in the United States toward
If you own an iPhone, be aware that a new iMessage vulnerability has been recently found and patched by Apple. This was part of the iOS 12.4 update. The flaw
Let’s take a little time to talk about the vast numbers of smart devices in use around the world. You probably have several in your home or office. Smart devices need
If you own an Android device, there’s a new threat to be at least moderately concerned about. It takes the form of a new ransomware family that spreads from one
Do you have an Android device? Are you running Android Nougat, Oreo, or Pie (versions 7x, 8x, or 9x)? Do you play games on your phone? If you answered yes
Do you use LibreOffice? It’s an open source clone that’s functionally similar to Microsoft Office that has grown quite popular over the years. It is available for Windows, macOS and
We’re talking about the result of a massive five billion dollar fine over violations surrounding the Cambridge Analytica scandal. While the staggering size of the fine made all the headlines,
Another week, another massive data breach. In this case, Capital One was the target when an unknown individual gained access to the company’s servers. The breach was detected by an
Recently, researchers from Boston University published a paper called “Tracking Anonymized Bluetooth Devices”. The paper detailed a flaw in the ubiquitous Bluetooth communication protocol that could expose device users to