Posts

Would Your Company Fail A Web Security Test?

How solid is your firm’s web security? According to recent findings by the penetration expert Ilia Kolochenko, probably not very good. Kolochenko should know. He is the CEO of High-Tech Bridge, and he and his research team have just finished an extensive review of business internet vulnerabilities. The results aren’t pretty. The two biggest highlights…

Read More...

Will Your Next Hard Drive Be MRAM?

There’s a new technology in the area of memory and storage. MRAM. If you haven’t heard of it, you’re not alone, but it’s one of two promising up and coming technologies that stand to change the storage game forever. The acronym stands for Magnetoresistive Random Access Memory, and there are three key things that make…

Read More...

Need More Laptop Drive Space? How About A 4TB SSD?

Samsung made a surprising new product offering with little fanfare. There was so little fanfare, in fact, that you may have missed it. The company is now selling a staggering 4TB SSD with a 2.5 inch form factor, which means it’s small enough to fit into a laptop. The only announcement the company made about…

Read More...

Will Printers Serve Up Your Next Computer Infection?

Vectra Networks has found an old, longstanding vulnerability in Windows, and it comes from a rather unexpected source. Printers. Way back in 2007, an eternity ago in the world of tech, Microsoft introduced a convenient new feature that was widely lauded by network administrators. This service called Microsoft Web Point-and-Print stated its purpose was to…

Read More...

Latest Breach Hits Omni Hotels – Has Information Been Stolen?

By now, the headlines will scarcely surprise anyone. Yet another business has suffered a major data breach. This time, it was Omni Hotels, a luxury hotel chain. The breach, which was discovered on May 30, 2016, began December 23, 2015 and was not completely eradicated from the company’s network until June 14, 2016. Unfortunately, we…

Read More...

Thieves Are Using Technology To Hack In And Steal Cars

The world’s hackers are branching out. No longer content to simply breach the digital fortresses that today’s businesses and governments have become, they’re now beginning to turn their attention to automobiles, too. In recent weeks, four vehicles with electronic key FOBs and digital security measures have been stolen. No trace of them has been found…

Read More...

Mac Is The Focus of New Malware

In the old days, before the rise of the iPad and iPhone, hackers were mostly content to leave Apple alone. They had such a tiny slice of the computer market that it was generally deemed as being more trouble than it was worth to create a virus that would only impact such a small number…

Read More...

Identity Thieves Use Social Media To Gain Personal Information

Identity theft is a large, pervasive, and growing problem. In fact, statistics show that the instances of identity theft jumped a staggering 57% last year alone, this, according to figures from the fraud-prevention service Cifas. The firm’s research into the increase of identity theft found that much of the growth has seen fraudsters targeting a…

Read More...

Android Users Infected By Malware Threat Known As Hummingbad

Most people engaged in legitimate business have no idea just how profitable hacking can be. Hummingbad is a case in point. Part of the “Hummer” family of Trojans, this bit of malware is the most widely installed Trojan on the mobile device ecosystem, impacting more than two billion Android users worldwide. The Trojan originated in…

Read More...

Ransomware Is Now Hitting Mobile Phones

Ransomware has become one of the fastest growing cybercrimes of 2016. Worse, these attacks are growing in their sophistication, and the hackers deploying ransomware have been upping their game by branching out onto different systems. As evidence, according to data provided by Kaspersky Lab, the number of users being attacked by mobile ransomware has quadrupled…

Read More...