Remove Or Update Flash From Your System Now

Remove Or Update Flash From Your System Now

Another month, another Flash vulnerability. This time, it’s designated as CVE-2016-4171 (details here: https://helpx.adobe.com/security/products/flash-player/apsa16-03.html ). This is yet another critical vulnerability, identified by Kaspersky Labs. So far, this hack has been spotted in the wild, being used in limited, targeted attacks. If successful, a hacker can crash your system, then take control over it when […]

read more
Accounts Hacked – Change Your Password If You Use TeamViewer

Accounts Hacked – Change Your Password If You Use TeamViewer

TeamViewer, the company behind a popular remote desktop platform, which allows users to share their screens, access their computers remotely, or participate in online conferences, has been hacked…maybe. A little over a month ago, the company received reports from a cross-section of users who claimed that their accounts had been accessed by unauthorized users. The […]

read more
Not Even Your Chats Are Safe From Hackers

Not Even Your Chats Are Safe From Hackers

Online security company Check Point Software Technologies has discovered a flaw in Facebook’s chat app that allows hackers to log in and change the content of chat messages (individual messages or entire chat streams) without notifying users that changes have been made. The exploit is accomplished by finding the unique identification number associated with each […]

read more
New Postage Sized SSD Means Smaller Devices Coming

New Postage Sized SSD Means Smaller Devices Coming

The push toward ever greater miniaturization has been present in the technology industry from the very beginning. Computers that once occupied whole rooms got small enough to fit onto any available desktop. PCs gave way to laptops, which are currently giving way to a variety of handheld devices, and still, the drive to make equipment […]

read more
Are You Doing Enough To Educate Employees On Security Risks?

Are You Doing Enough To Educate Employees On Security Risks?

Your employees are both your company’s greatest asset and your biggest potential security risk. In a recent study conducted by Experian Data Breach Resolution and Ponemon Institute, it was found that 55% of companies surveyed have experienced one or more security incidents where the catalyzing event was a negligent or malicious employee. The study also […]

read more
Android Provides Additional Find-Your-Phone Option

Android Provides Additional Find-Your-Phone Option

If you’re one of the millions of users with an Android phone, then you already know there are a couple of different ways you can find it if you happen to misplace it. You can use the built-in search feature, or the Device Manager app. As of now, Google has rolled out an additional option, […]

read more
Search Results Look Weird? You Might Be Infected

Search Results Look Weird? You Might Be Infected

Have you been noticing “strange” search results when you’re surfing the web? Have your search results been taking longer than usual to appear? You may have been infected by a new, very clever bit of malware known as Redirector.Paco. There are actually two flavors of this malicious software, the key differences between them is that […]

read more
Have Bots Taken Over The Internet?

Have Bots Taken Over The Internet?

What percentage of total internet traffic would you estimate that bots (non-human visitors) account for? Twenty percent? Thirty percent? Unfortunately, according to data released by DeviceAtlas, a company that makes software to detect the kinds of devices web visitors are using, reveals that non-human sources account for a staggering 48% of all web traffic. This […]

read more
That USB Phone Charger Might Be Stealing Your Data

That USB Phone Charger Might Be Stealing Your Data

If you haven’t yet heard of “KeySweeper,” you have a new threat to be on the lookout for. The KeySweeper device is built with off the shelf, Arduino components. These can be programmed for a variety of purposes, but the hacking community is using them as stealthy keylogging devices. By all outward appearances, the device […]

read more
Don’t Turn Off Security Updates To Avoid Windows 10 Upgrade

Don’t Turn Off Security Updates To Avoid Windows 10 Upgrade

In recent months, Microsoft has made a number of very good, highly popular moves that have had its customers raving about its apparent change. This latest incident, however, isn’t one of those. Microsoft has been accused of resorting to malware-style tactics to try and force Windows 7 and 8 users to upgrade to Windows 10, […]

read more
Are You Ready For A 10 Core Processor?

Are You Ready For A 10 Core Processor?

You’ve probably got either a dual- or quad-core computer sitting on your desk right now, but if you love bleeding edge technology, then you’re going to want to upgrade after reading this. Recently, at the Computex trade show in Taipei, intel unveiled its first ever 10-core processor, designed for the home market (although why these […]

read more
A Number Of Major Manufacturer Laptops May Have Security Risks

A Number Of Major Manufacturer Laptops May Have Security Risks

Security firm Duo Security recently published a disturbing report relating to laptop security. It found critical security flaws in laptops produced by five of the largest OEMs: Acer, Asus, Dell, Hewlett-Packard, and Lenovo. If you’ve purchased, and are currently using laptops from these manufacturers, you are potentially at risk. Specifically, what the security firm found […]

read more