Security researchers from Check Point have unearthed a new vulnerability dubbed QuadRoot that leaves potentially 900 million or more Android-based...
Read Morecategory: Blog
Many Android Phones May Be Vulnerable To QuadRoot Hack
How Delve Can Benefit your Business
Frequent Password Changes May Compromise Security
By now, it’s a familiar story. Conventional wisdom holds that you want to use a different password on every site or service you log into and that you...
Read MoreRansom Hackers Are Targeting iPhone Users
Ransomware has made some inroads into the realm of smart devices, but until quite recently, Android devices were the target of choice. That seems to...
- Apple
- Blog
- General Interest
- Malware and Virus Protection
- Recent News
- Security
- Technology
- Technology News
Your Microsoft Account Credentials May Be Vulnerable
In fact, your Microsoft Account Credentials are almost certainly vulnerable, but until the rise in popularity of Windows 10, it hasn’t been nearly as...
- Blog
- General Interest
- Malware and Virus Protection
- Microsoft
- Recent News
- Security
- Technology
- Technology News
- Windows
Don’t Plug In That USB Drive!
USB drives. They’re ubiquitous. They’re everywhere. You probably have several floating around your office, or nearby. We tend to use them so often...
Read MoreYahoo User Information Breached: 200 Million Accounts Affected
If you have a Yahoo email account, you’re not alone. The company is one of the largest free email account providers on the internet, which...
Read MoreBanner Health, based in Phoenix, AZ, has the dubious honor as having been the recipient of the largest healthcare related data breach so far in 2016....
Read MoreDoes your company currently have a formal email policy? If you don’t, you need one, and sooner, rather than later. As the first “killer app” in the...
- Blog
- Business & Finance
- Employees
- Malware and Virus Protection
- Productivity
- Security
- Technology
- Technology Tips
A Number of Popular Wireless Keyboards Can Be Easily Hacked
In recent months, we’ve seen an upsurge in the number of attacks that have been executed by exploiting wireless peripherals attached to computers....
Read More