Check out the latest business IT News.
File this one away under “it should go without saying, but…” One of the most amazing and disheartening aspects of internet use is that after all this time, a shocking number of people are still getting taken in by the lure of installing a “crack” for popular software. It should go without saying that installing…
Read MoreThe government is taking a more active hand in establishing security protocols for at least one part of the Internet of Things. Specifically, new guidelines are being drafted by the FDA to set minimum security standards for ‘smart’ medical devices. In recent months, a number of security researchers have demonstrated the ability to hack into…
Read MoreHardly a week goes by that a new exploit or attack vector doesn’t come to light that your IT staff has to try to defend against. The most recent threat comes from a vulnerability in the PHP Mailer Library, which is code used by most of the websites in existence today to help manage the…
Read MoreIf you use Netgear routers in your home or office network, you should be aware of the latest security threat. The company has confirmed that three lines of its routers may have these issues: • R6400 • R7000 • R8000 series At this time, it has not been confirmed if or whether the R7000P, R7500,…
Read MoreSuper Mario Run is taking the internet by storm and has replaced Pokemon Go as the hottest app on the market today. It’s so popular that many Android users, eager to start playing the latest craze, aren’t waiting for the app to show up in the Google Play Store and are looking instead to third…
Read MoreThe fortunes of Mozilla’s Firefox browser continue to improve thanks to the company’s ongoing efforts to improve their product. With Microsoft Edge hemorrhaging users at a record pace, Firefox has been picking up significant numbers of Microsoft’s former users as they look for a more stable browser solution. In recent months, Firefox has been testing…
Read MoreIf you have never heard the term “steganography,” you’re not alone. It’s the art and science of hiding code inside image data. When used by hackers, it is one of the most difficult attack vectors to detect, because honestly, few people consider images to be more than window dressing for the web. That is, in…
Read MoreDo you use any sort of Thunderbolt device on your Mac? If you do, and you haven’t been keeping your OS up to date, you’ll definitely want the latest security patch. Recently, a security researcher named Ulf Fisk found a devastating security flaw that allows a corrupted Thunderbolt device to gain complete access to your…
Read MoreGoogle is about to change the game where the Internet of Things (IoT) is concerned. Recently, the company announced the release of Android Things, an operating system specifically designed for internet objects. One of the main limitations internet objects have is memory and computing power, so the new OS is designed to operate with an…
Read MoreYet more critical security flaws have been found in Adobe’s poor, beleaguered Flash Player. The company continues to fight gamely to keep pace, patching issues as quickly as they are found, but there doesn’t appear to be any end in sight. The most recent bug, tracked as CVE-2016-7890, would have allowed hackers to take control…
Read More