
NFC connections limit attacks on Android OS
Near Field Communication (NFC) connections are quite handy for transferring data between two devices. Whether you want to send photos, videos, files, or make a payment, NFC can make it
Insights and tips to keep your IT ahead of the curve
Near Field Communication (NFC) connections are quite handy for transferring data between two devices. Whether you want to send photos, videos, files, or make a payment, NFC can make it
If you’re using Google’s Chrome browser, read this article. The company has announced a pair of major, Zero-Day vulnerabilities that put you at immediate risk. Not only are the flaws
Not long ago, Google decided to remove the “Close Other Tabs” option from the right-click context menu of their browser. While its removal didn’t exactly cause an uproar among Chrome’s
When you think scammers couldn’t get any lower, they find new ways to prove you wrong. Recently, a new phishing email scam has arisen in the wild; this one baiting
Do you use the Discord chat service? Be advised that malware developers have been using the service to host various types of malware and use it as a command and
Apple’s App Store by Wandera Threat Lab discovered more than a dozen iOS apps infected with the ‘Clicker’ Trojan malware. As malware goes, this variant isn’t especially dangerous to those
Do you have a Netflix account? And, have you ever done password sharing with family or friends? If so, you know how awesome the service is. Intuitive and easy to
Microsoft continues its war against spam and phishing emails with a new feature in Office 365 called ‘Unverified Sender.’ And so, Microsoft designed it to help Outlook users identify emails
Billtust is a major player in the US financial services sector that provides a variety of billing and payment processing services for some of the biggest financial institutions in the
A NordVPN data breach disclosed when a server in one of their data centers breached in March of 2018. According to the details released, the server located in a data
Have you heard of Skip-2.0 malware? Prepare to be dismayed. Backdoor Access for Hackers Security researchers have recently discovered an undocumented (until now) backdoor designed for Microsoft SQL servers. It
Hackers use virtual assistant devices to steal The utility of virtual assistant devices like Amazon’s Alexa and Google Home is undeniable. They’re just genuinely handy devices to have around. Unfortunately,