Google may still be tracking you…
Adding to the growing mistrust consumers have about what tech companies do with the data they collect, we learned this week from an Associated Press investigation that Google still tracks and stores your whereabouts…
Google may still be tracking you…
Adding to the growing mistrust consumers have about what tech companies do with the data they collect, we learned this week from an Associated Press investigation that Google still tracks and stores your whereabouts…
Introduction
Today, we hear a lot about IoT, which stands for internet of things. All these smart boxes, light bulbs, shades, thermostats, voice assistants, and smart machines are slowly sneaking into our households, businesses and industrial environm…
Introduction
Today, we hear a lot about IoT, which stands for internet of things. All these smart boxes, light bulbs, shades, thermostats, voice assistants, and smart machines are slowly sneaking into our households, businesses and industrial environm…
Intel started 2018 with an unfortunate bang — the Spectre and Meltdown flaws inherent in the architecture of their chips was the main topic of conversation in the cybersecurity world. While damage control continues regarding those vulnerabilities,…
Here’s the news #nofilter: thousands of Instagram users are reporting that their accounts were hacked this month, possibly the result of a so-called spam bot attack.
Every week, our researchers round up the latest security news and report our findings in these blog pages. If you’ve been reading, you may have noticed a particularly nasty trend claiming new victims week after week — data breaches. In the last two mon…
At DEFCON last week, white hat hackers explained during a presentation that it is indeed possible to hack an Amazon Echo. Security researchers from Chinese conglomerate Tencent described the steps they took to turn a regular, working Echo into a spying…
For managed service providers (MSPs), it’s more difficult than ever to differentiate services and build a viable business. Declining prices, increasing commoditization, and intensifying competition all contribute to this new reality. For some MSPs, bui…
Between ransomware, data breaches, cryptojacking, supply chain attacks, and mobile malware, it’s never been more important to protect your digital life.