Blog

The WiFi of the Future May Consume Much Less Power

Battery life for mobile devices is their single biggest weakness. The greatest challenge in growing and managing the exploding “Internet of Things” isn’t the devices themselves, but rather, the power […]

Many Android Phones May Be Vulnerable To QuadRoot Hack

Security researchers from Check Point have unearthed a new vulnerability dubbed QuadRoot that leaves potentially 900 million or more Android-based smartphones vulnerable. The attack manifests when a user unwittingly installs […]

Frequent Password Changes May Compromise Security

By now, it’s a familiar story. Conventional wisdom holds that you want to use a different password on every site or service you log into and that you want to […]

Ransom Hackers Are Targeting iPhone Users

Ransomware has made some inroads into the realm of smart devices, but until quite recently, Android devices were the target of choice. That seems to be changing now. Increasingly, we’re […]

Your Microsoft Account Credentials May Be Vulnerable

In fact, your Microsoft Account Credentials are almost certainly vulnerable, but until the rise in popularity of Windows 10, it hasn’t been nearly as big an issue as it is […]

Don’t Plug In That USB Drive!

USB drives. They’re ubiquitous. They’re everywhere. You probably have several floating around your office, or nearby. We tend to use them so often that we don’t even think about it, […]

Yahoo User Information Breached: 200 Million Accounts Affected

If you have a Yahoo email account, you’re not alone. The company is one of the largest free email account providers on the internet, which unfortunately means that when they […]

Millions Of Banner Health Members Affected By Latest Security Breach

Banner Health, based in Phoenix, AZ, has the dubious honor as having been the recipient of the largest healthcare related data breach so far in 2016. The cyberattack was launched […]

Create An Email Policy For Your Employees To Protect Your Business

Does your company currently have a formal email policy? If you don’t, you need one, and sooner, rather than later. As the first “killer app” in the world of computing, […]

A Number of Popular Wireless Keyboards Can Be Easily Hacked

In recent months, we’ve seen an upsurge in the number of attacks that have been executed by exploiting wireless peripherals attached to computers. Hackers can even intercept signals sent to […]

Newsletter

Join our Newsletter to get the latest technology news and special offers.


Social Media

Facebook RSS