Be Wary Of Open Public WiFi
Public WiFi is ubiquitous. Pretty much anywhere you go these days, you’re going to find a free network you can connect to. Stop in to grab some coffee, free WiFi. Grab lunch at t
New Form of Malware Used Ads To Infect Computers
The FBI has recently shut down a particularly nefarious ad server called the AdGholas group, which used a new and innovative method of infecting computers and managed to avoid dete
4 out of 5 Business Networks Have Security Threats
According to security company Infoblox, a staggering 83{7e4ee7cd997d36f6dec43befd6b19c37edf0959bbf61766e988f901dd91e96d7} of the networks they’ve studied contain some form of mal
Data Breach Costs Up 30 Percent, Is Your Business Secure?
The annual “Cost of a Data Breach” study has been released, and the results aren’t pretty or encouraging. Between 2013 and now, the total cost to a company hit by a data brea
This Year’s Leap Second Could Cause Some Computers To Crash
System administrators have their hands full dealing with “Leap Seconds,” the extra second periodically added to the day by scientists working with UTC (Coordinated Universal Ti
Microsoft Reducing OneDrive Cloud Storage Space For Many Users
If you use Microsoft OneDrive, it’s time to review your usage rate, and perhaps start thinking of switching to a different cloud-based storage solution. When the service was firs
Be Careful: Fake Apps Are Stealing Information
Security researchers at the firm ESET have recently warned of a total of 8 apps found on the Google Play store. These apps, at first glance, appear to be designed to help users inc
Will Printers Serve Up Your Next Computer Infection?
Vectra Networks has found an old, longstanding vulnerability in Windows, and it comes from a rather unexpected source. Printers. Way back in 2007, an eternity ago in the world of t
Identity Thieves Use Social Media To Gain Personal Information
Identity theft is a large, pervasive, and growing problem. In fact, statistics show that the instances of identity theft jumped a staggering 57{7e4ee7cd997d36f6dec43befd6b19c37edf0
Android Users Infected By Malware Threat Known As Hummingbad
Most people engaged in legitimate business have no idea just how profitable hacking can be. Hummingbad is a case in point. Part of the “Hummer” family of Trojans, this bit of m