Get in Touch
A major security flaw called CVE-2018-8897 was identified earlier this year in operating systems running Intel processors, which affected Microsoft, Apple, and Linux distributions. While you may not...
The cyber world, much like the real one, is filled with trade-offs and compromises.
For instance, a VPN (virtual private network) may offer more...
Assuming this is not a case where other shoes will be dropping with the thud of carefully manipulated damage control, MyHeritage did everything right....
At least four Chinese manufacturers had unfettered access to Facebook’s user data, thus joining the ranks of Cambridge Analytica, Blackberry, Apple, Amazon, Samsung and...
You know the what digital transformation is, even if you haven't heard the term before (hint: it's been happening since the late 1990s). Yes, that digital transformation.
To be...
The FBI has advised owners of internet routers worldwide to reboot their devices in order to disrupt and help better identify a malware-driven botnet...
KnowB4’s chief hacking officer Kevin Mitnick released a video that should send shudders down the spine of anyone using 2-factor authentication.
Implementing a standard attack...
It doesn’t matter how many times you tell employees not to share passwords. A new study suggests many people are still going to do...
With all of the headlines about potential vulnerabilities and hacks through IoT-enabled devices, there’s a much more prevalent way to get got.
The inherent...
Google’s email platform has more than a billion active monthly users as of the last count in February 2016, which is why the recent...