News

November 5, 2020

What You Need to Know about the Zerologon Vulnerability

A critical vulnerability in the Microsoft Netlogon Remote Protocol is leaving some companies open to attack. Here is what you need to know to determine if […]
October 26, 2020

New Tactic Is Bringing Ransomware Extortion to a Whole New Level

Cybergangs continually look for new ways to make their ransomware campaigns more effective, but sometimes they just seem to fall in their lap. Learn how ransomware […]
October 22, 2020

Securing Facial Recognition Data and Potential Risks

As federal agencies and local law enforcement continue to use facial recognition to probe for potential suspects it is also considered to be an invasion of […]
October 12, 2020

Protecting Global Networks and Identifying Threats

As the dark web becomes multi-national, US government agencies are racing to identify who are responsible for the latest ransomware attacks.
October 5, 2020

Vishing Scam Is Targeting Telecommuters

A voice phishing (vishing) scam that targets employees working from home is making the rounds. Learn how this scam works and what your company can do […]
September 28, 2020

Big Changes Are Coming Soon for Microsoft Edge Legacy and Internet Explorer 11 Users

Microsoft will be phasing out support for its Edge Legacy and Internet Explorer 11 (IE11) web browsers. Here is what you need to know about the […]
September 24, 2020

Google Releases a version of iPhone AirDrop on Androids

By far, the two most popular smartphone platforms available on the market today are Apple’s iOS and Google’s Android operating systems. iOS, of course, only works […]
September 17, 2020

How Contact-Tracing Apps Work

Many contact-tracing apps have popped up since the Coronavirus Disease 2019 (COVID-19) pandemic began. Discover how their technologies influence how they operate.
August 31, 2020

What You Need to Know about the Zero Trust Model

Network infrastructures are getting more complex and thus harder to secure with traditional network security tools. Fortunately, there’s a viable alternative: the zero trust model. Here […]