5 Ways Your Employees Will Invite Hackers Into Your Network
Whether they’re criminals or heroes, hackers in the movies are always portrayed as a glamorous group. When it ...
Whether they’re criminals or heroes, hackers in the movies are always portrayed as a glamorous group. When it ...
Sophos has released the results of their annual "State of Endpoint Security Today", and it doesn't paint a pretty picture. A full 54% of companies surveyed reported having been hit by ...
Microsoft is getting tough on so-called "registry cleaners", and it's about time. The company recently announced a planned change to Windows Defender (the anti-malware program that comes standard with every Windows ...
Security researchers from around the web are reporting finding an increasing number of instances of proof of concept (PoC) code that incorporates the recently discovered Spectre and Meltdown vulnerabilities. If you ...
Oracle is currently the third-largest provider of POS (Point of Sale) software on the market today, which means that there's a fairly good chance you're using an Oracle POS system. If ...
Do you know who manages and maintains your business’ technology? In most cases, it will be either a small ...
If ever there were two phrases that didn't seem to go together, they would probably be "Fitness trackers" and "National Security Risk." The very idea that a simple fitness tracker could ...
Google recently released their Play Store stats for 2017. The results are both encouraging and disheartening. Overall, Google caught and removed more than 700,000 malicious apps from the Play Store, minimizing ...
If you’ve heard of blockchain recently, there’s a pretty good chance it was in reference to cryptocurrency. With Bitcoin ...
Recently, Apple found itself in hot water with its normally adoring user base. This happened when it became known that the company was intentionally throttling (slowing down) the speed of older ...