by Master User | Apr 6, 2016 | Blog
It seems that Google never stops innovating and striving to improve the services it offers. Gmail, for instance, recently got some impressive upgrades that build on those rolled out previously, which aims to keep Gmail’s billion plus active users safer than ever...
by Master User | Apr 5, 2016 | Blog
There’s another new attack vector to beware of if you own an iPhone. This new attack, called AceDeceiver MITM is quite possibly the most convoluted attack the hackers have come up with yet, and stands as an excellent example of just how far the hackers will go to get...
by Master User | Mar 31, 2016 | Blog
In recent months, Apple has been increasingly on the receiving end of unwanted attention from the hacking community. Apple’s OS offerings have long been touted as being more robust and secure than Microsoft’s Windows, and so far, the company is living up to that...
by Master User | Mar 30, 2016 | Blog
If you haven’t heard the term “whaling attack,” as it relates to the hacking community, you’re not alone. It’s a fairly recent phenomenon, and is a subset of the standard phishing attack, where hackers will contact employees of a company in an effort to get user IDs,...
by Master User | Mar 29, 2016 | Blog
One of the nation’s largest firms engaged in assisting other companies in dealing with data breaches has now confirmed that they themselves have suffered a data breach, this one affecting 1.5 million business clients. In a formal statement, a company spokesman...
by Master User | Mar 28, 2016 | Blog
One of the worst things about taking business trips is the airplane WiFi. It’s a lesson in patience. More often than not, owing to the slow speeds and anemic bandwidth available, you’re better off not even trying to get anything productive done in-flight. One company,...