Will Your Thermostat Be The Next Device Held For Ransom?

Will Your Thermostat Be The Next Device Held For Ransom?

An interesting and disturbing new form of Ransomware was on display at this year’s Def Con convention, in Las Vegas. So far as anyone knows, this is the first, proof of concept ransomware that targets smart thermostats. Yes, you read that correctly. The new ransomware is specifically designed to target smart thermostats. Various security experts […]

read more
Is Your Home’s New Smart Deadbolt Secure?

Is Your Home’s New Smart Deadbolt Secure?

Much has been written in previous months about the explosion in growth of the (IOT) Internet of Things, and the security risks posed by that growth. Where PCs, laptops, and smartphones all have fairly robust security measures in place to prevent hackers from gaining easy access, the same cannot be said of the growing legion […]

read more
Internal Breaches On The Rise For Many Companies

Internal Breaches On The Rise For Many Companies

In some important ways, the media has a tendency to distort the reality where hacking and data breaches are concerned. The stories that tend to make the headlines are the external breaches that see hackers making off with tens of millions, or even hundreds of millions of customer records. They’re good stories. They get clicks […]

read more
Passwords More Popular Than Fingerprint Scanners in U.S.

Passwords More Popular Than Fingerprint Scanners in U.S.

Although a number of tech companies have been working hard to create new and ever more robust security and authentication protocols, a recent survey revealed that the American public in general remains highly skeptical of the new procedures, and only a tiny fraction of the population actually employs them. The survey results reveal that more […]

read more
USB-C Getting Certification Program To Protect Against Safety Issues

USB-C Getting Certification Program To Protect Against Safety Issues

You probably don’t know the name Benson Leung. He’s one of the internet’s unsung heroes, and in recent months, he’s been quietly waging a one-man war against manufacturers producing faulty USB-C chargers. Many users have reported having their smartphones fried by the faulty cables, which did not properly regulate the amount of current flowing through […]

read more
Survey Shows Company CIO’s Are Looking At Cloud Services

Survey Shows Company CIO’s Are Looking At Cloud Services

There has been an explosive growth in companies offering private cloud as part of a broader offering of managed services, and businesses are responding positively to the trend. Interestingly, while companies are moving to embrace the private cloud and managed services in general, overwhelmingly, the push to do so is being led by CIOs. This […]

read more
Sage Is Latest Company To Report Internal Data Breach

Sage Is Latest Company To Report Internal Data Breach

Sage, LLC, a British company providing business software solutions for clients around the world, was the latest victim of a data breach. This one, however, came from inside the company itself. This is an increasingly common problem, though not as widely reported as the high profile data breaches from hackers outside the company’s firewall. One […]

read more
90 Percent of People Ignore Important PC Security Warnings

90 Percent of People Ignore Important PC Security Warnings

What do you do when you get a popup window generated by some piece of software you use, informing you of a critical update? Do you stop what you’re doing right then and perform the needed update? Most people don’t, according to recent research. In fact, a full ninety percent of users simply close the […]

read more
Ransomware Heavily Targeting Health Care Companies

Ransomware Heavily Targeting Health Care Companies

You’ve probably seen the headlines. This year, hardly a week goes by that there isn’t a report of a company in some way connected to the health care industry falling victim to ransomware. If you think it feels like they’re being specifically targeted, you’re not imagining things. According to the latest research by FireEye, hackers […]

read more
New Tech Can Copy And Mimic Your Handwriting

New Tech Can Copy And Mimic Your Handwriting

Researchers at University College London have created a fascinating algorithm that can take a sample of hand-written text, and imitate it with eerie similarity. At first glance, that might seem like a silly, or even trivial thing to spend time on, but make no mistake. The problems being solved here are far from trivial. As […]

read more
Adobe Flash May Soon End On Google Chrome

Adobe Flash May Soon End On Google Chrome

Adobe’s beleaguered Flash player may finally be seeing its last days, at least if Google has anything to say about it. The player has been exceedingly popular, and at its peak, a vast number of websites relied on it heavily to display content and advanced features to website visitors. Unfortunately, in recent years, a number […]

read more
App From Microsoft Creates Better Two-Factor Authentication

App From Microsoft Creates Better Two-Factor Authentication

Microsoft is a company that definitely understands the need for better and more secure information systems. Like many other tech companies, they’ve been pushing hard for two-factor authentication protocols covering large swaths of their online ecosystem. Unfortunately, their approach has been rather messy and unfocused. They’re attempting to remedy that situation by announcing the rollout […]

read more