Skip to main content
Report this ad

The Latest

  • Hacking Team hacked: Leaked documents create indignation around the world
    Hacking Team hacked: Leaked documents create indignation around the world
    The security world might be chucking but the 400GB of Hacking Team documents, emails and source code leaked by the hackers created ripples of indignation and anger around the world on July 6. The Italian company, Hacking Team, sells surveillance...
  • Security Tech Solutions Webinar
    Securing your business, security solutions webinar by Plan B Technologies
    Did you know? Security should be a top concern for all organizations. It's a fact that attacks and methods of attack are ever-changing, so the technologies and solutions to combat these threats are responding as a result. Will your...
  • Apple Macs may be more vulnerable to malware
    Apple Macs may be more vulnerable to malware
    Since the first Mac was produced in 1984, Apple has proudly asserted that, unlike its PC-based competitors, their technology was much more secure and immune to nearly all malware attacks. However, there is growing evidence that Apple’s...
  • 5 Online Security Tips You need to know
    5 Online Security Tips You need to know
    It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate.PasswordsBeing that cyber crime has been a fixture of modern living for over a decade, you&rsquo...
  • What is a Potentially Unwanted Program (PUP)?
    What is a Potentially Unwanted Program (PUP)?
    Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that there are YouTube Channels, Facebook accounts, and Buzzfeed newsletters devoted to the subject. Unfortunately, there’s a not so...
  • Mobile Apps Failing Security Tests
    Mobile Apps Failing Security Tests
    It’s been said that there are over a million different apps for the smartphone. Well, however many may exist, know that not all of them are passing security tests with flying colors.You may already be a user of at least several of the 25...
  • What is a Remote Administration Tool (RAT)?
    What is a Remote Administration Tool (RAT)?
    Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT.A RAT or remote administration tool, is software that gives a person full control a tech device, remotely....
  • Is Lenovo installing adware/malware on new computers?
    Lenovo denies installing malware on new computers
    The tech internet is all abuzz with the disclosure that Lenovo installs Superfish on new computers they ship."Malware" the internet screams.Not so fast, Lenovo responds.Lenovo says it is doing nothing of the kind and that Superfish is...
  • How to Spot a Splog
    How to Spot a Splog
    I really enjoy reading blogs. And since you are here, reading my blog post, I’m guessing you do too. Blogs are a great way of gaining information and learning about different perspectives on a wide variety of topics. Unfortunately, spammers...
  • What is a Rootkit?
    What is a Rootkit?
    A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He...
  • Hacking 2015 and Beyond
    Hacking 2015 and Beyond
    2015 brings us no closer to putting the lid on hackers as any other year has. The crime of Criminal hacking will prove to be as big as ever in the new year. Here’s what we have to look forward too:Bank Card Breaches There will always be the...
  • Ransomware
    Responding to ransomware: To pay or not to pay a ransom for your data
    A recent Kim Kommando article offered some curious advice about ransomware, a malicious software app that threatens to destroy all your data if you do not pay a ransom fee. She suggests that there may be instances when the best thing to do if your...
  • Powerful malware has been infecting US government software since 2011
    Powerful malware has been infecting US government software since 2011
    The Department of Homeland Security released some alarming news on Friday. The federal agency revealed that government computers have software that has been infected with malware and that the threat that lies in being hacked is very real....
  • What is Browser Hijacking?
    What is Browser Hijacking?
    Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked.Browser...
  • Both Dairy Queen and Kmart suffer hacking attacks
    Both Dairy Queen and Kmart suffer hacking attacks
    According to reports by ABCNews and the Associated Press, both Dairy Queen and Kmart have become the latest two victim of the point-of-sale hackers. On Thursday it was spokespeople from the fastfood chain that 395 establishment had suffered a...
Report this ad