Get in Touch
By and large, HTTPS—the encrypted form of delivering websites – has proven to be a very effective mechanism for assuring the legitimacy of websites,...
Google’s email platform has more than a billion active monthly users as of the last count in February 2016, which is why the recent...
With all of the headlines about potential vulnerabilities and hacks through IoT-enabled devices, there’s a much more prevalent way to get got.
The inherent...
It doesn’t matter how many times you tell employees not to share passwords. A new study suggests many people are still going to do...
KnowB4’s chief hacking officer Kevin Mitnick released a video that should send shudders down the spine of anyone using 2-factor authentication.
Implementing a standard attack...
The FBI has advised owners of internet routers worldwide to reboot their devices in order to disrupt and help better identify a malware-driven botnet...
You know the what digital transformation is, even if you haven't heard the term before (hint: it's been happening since the late 1990s). Yes, that digital transformation.
To be...
At least four Chinese manufacturers had unfettered access to Facebook’s user data, thus joining the ranks of Cambridge Analytica, Blackberry, Apple, Amazon, Samsung and...
Assuming this is not a case where other shoes will be dropping with the thud of carefully manipulated damage control, MyHeritage did everything right....
The cyber world, much like the real one, is filled with trade-offs and compromises.
For instance, a VPN (virtual private network) may offer more...