Check out the latest business IT News.
Point of Sale (POS) systems are notoriously easy to hack. Hardly a month goes by that we don’t hear of some vendor or another having had their POS system breached, exposing customer credit card and other personal data. It’s always the same story. X numbers of users are impacted, notified and told to watch their…
Read MoreYou may have heard the statistic from Google that less than 0.05 percent of Android devices downloaded malware in 2016. It’s a great statistic, and one that the company should be proud of. Here’s a statistic they’re not talking about nearly as much: this year, the number of successful ransomware attacks against Android devices has…
Read MoreGoogle is struggling to keep malware out of the Play Store these days. Recently, literally thousands of malicious apps were discovered, and Google has been busy banning them. This represents a significant reversal of fortunes for the tech giant, which in recent years has been able to brag about its success, relative to other companies,…
Read MoreIt’s no secret that 2017 is on track to beat 2016 handily in terms of the total number of network breaches, and sadly, 2016 was itself a record-breaking year. What is less well known is the fact that most of the successful breaches are accomplished via exploits that have been identified for literally years. This…
Read MoreDo you rely on the AccuWeather App to keep tabs on local weather conditions? If so, you’ll want to read this. According to an independent security researcher named Will Strafach, the AccuWeather app designed for iOS sends your location information to a firm called “Reveal Mobile,” which is a data monetization company. Based on Strafach’s…
Read MoreSecurity researchers from firms around the web are warning of a new email exploit that hackers can use to modify the contents of an email, even after it has been sent and delivered. Originally discovered by Francisco Ribeiro of the firm Mimecast, Ropemaker stands for “Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky,” and…
Read MoreWould modern life even be possible without Wi-Fi? There are many who don’t think so, and you may be one of them. One of the biggest problems with it, though, is that the range of the signal is quite limited. Get more than a couple hundred feet away from the source of the signal, and…
Read MoreFor a time, Locky ransomware was the scourge of the internet and was considered by many security experts to be the most widely distributed form of malware on the internet. Things change, however, and the internet marches on. Hackers latch on to the latest and greatest variants, and after a brief surge to the top,…
Read MoreRemember the global Wannacry ransomware attack? Remember the even more recent Petya attacks? You would think after either of these, IT professionals around the world would have stepped up and immediately implemented better, stronger and more robust security protocols, because as those attacks proved, if the hackers want to, they can bring not just individual…
Read MoreNationwide may be “on your side,” as their ads claim, but they’re not immune to data breaches, and in 2012, they suffered a serious one that impacted more than 1.2 million of their customers. A post mortem investigation into the breach concluded that it was made possible because the company failed to install a security…
Read More