Popular Food Site Zomato Breached – 17 Million Users Affected
India’s largest online restaurant guide, Zomato, boasts some 120 million users. If you live there, or have employees in India, they may have been impacted, as the company has just
Insights and tips to keep your IT ahead of the curve
India’s largest online restaurant guide, Zomato, boasts some 120 million users. If you live there, or have employees in India, they may have been impacted, as the company has just
As good as Google is about reviewing the apps that find their way into the halls of the Google Play Store, malicious code still manages to find its way inside.
If you’re a music fan, you’ve probably got several hundred (or more) MP3 files on your computer. It burst onto the scene while the internet was still in its formative
Sometimes, legitimate companies accidentally create malware. That’s certainly the case in this latest example. It was an innocent mistake, but some debugging code was inadvertently left in the code of
The Empire is officially striking back, and hacking is about to get at least a little bit harder. Recently, there have been several high-profile attacks that relied on Google’s user
It’s been a bad week for the corporate world. Things started off with a bang thanks to the “WannaCry” ransomware attack that targeted more than 200,000 company locations in more
DocuSign, the world’s leader in electronic signatures for official documents, played an unwitting role in a particularly nasty phishing attack. If you’re not familiar with the company, DocuSign is used
Phishing attacks are a fact of life on the internet these days, but recently, a Google Doc was used in a wide-spread, wildly successful attack that security researchers are calling
Google is throwing its weight around on behalf of the netizins of the world. Beginning this October, Chrome users will start seeing “Not Secure” warning messages any time they use
Unless you are intimately familiar with digital security, odds are good that you’ve never heard of Snake, Uroburos or Turla. These are three different aliases used by a single group
Does your company use IBM Storwize? If you’re not sure what that is, then you probably don’t. It’s the company’s Big Data storage system, and when you purchase it, you
Researchers from Check Point Software Technologies have identified a new strain of malware dubbed OSX/Dok that has been found infesting macOS users. The new malware has been primarily found in