If you’re a Mac user who downloads files using the torrent software called “Transmission,” you may want to check your machine for signs of infection....
Read Morecategory: Blog
Malware On Your Mac May Be Caused By BitTorrent Client
Your Keystrokes May Be Stolen Through WiFi
There have been papers written and demonstrations conducted in recent months to show how it’s possible to wirelessly log your keystrokes. All of...
Read MoreDropbox Just Required A Password Reset From 2012 Hack
If you’re one of the millions of Dropbox users around the world, you were probably mildly annoyed recently when you logged on to find that you were...
- Blog
- Malware and Virus Protection
- Security
- Social Networking
- Technology News
- Technology Tips
- Uncategorized
Replacing DirSync With Azure AD Connect
Azure AD Connect is the best way to connect your on-premises directory with Azure AD and Office 365. This is a great time to upgrade to Azure AD...
Read MoreIf You Use Opera Browser Password Sync, Change Passwords Now
Opera does not have anything that could be described as a commanding share of the web browser market, but as one of oldest and best loved browsers in...
Read MorePoint Of Sale System Security Questioned As MHR Reports Breach
Shaun Treacy, the President of MHR (Millennium Hotels and Resorts) North America, has recently sent a communication to guests who stayed at some of...
Read MoreWill Your Thermostat Be The Next Device Held For Ransom?
An interesting and disturbing new form of Ransomware was on display at this year's Def Con convention, in Las Vegas. So far as anyone knows, this is...
- Blog
- General Interest
- Malware and Virus Protection
- New Technology
- Recent News
- Security
- Technology
- Technology News
Is Your Home’s New Smart Deadbolt Secure?
Much has been written in previous months about the explosion in growth of the (IOT) Internet of Things, and the security risks posed by that growth....
Read MoreInternal Breaches On The Rise For Many Companies
In some important ways, the media has a tendency to distort the reality where hacking and data breaches are concerned. The stories that tend to make...
Read MorePasswords More Popular Than Fingerprint Scanners in U.S.
Although a number of tech companies have been working hard to create new and ever more robust security and authentication protocols, a recent survey...
Read More