Security & Privacy

September 22, 2021

Update your iPhone Now

Apple released iOS 14.7.1, iPadOS 14.7.1 and macOS Big Sur 11.5.1 on 7/26/2021, which are the latest updates for all of its operating systems (OSs). The […]
September 20, 2021

The Massive Costs of Ransomware Attacks

Ransomware attacks have continued to increase in 2021, creating challenges for individuals and organizations throughout the world. Major victims of recent attacks include Apple, Colonial Pipeline […]
September 15, 2021

Senate & House Using Bills to Combat Cyberattacks. Is it Working?

The U.S. House of Representatives has recently passed multiple bills to support cybersecurity requirements for state and local governments as of July 2021. This legislation would […]
September 2, 2021

The New Wave of Digital Card Skimming

The COVID-19 pandemic has greatly increased online shopping, making these payment systems a more lucrative target for cyber criminals. Digital skimming attacks are now the greatest […]
September 1, 2021

Phishing Deep Dive: What Is Phishing?

If you ask three people what phishing is, you’ll likely get three very different answers. To understand what phishing is, you have to look at the […]
August 30, 2021

8 Actions Your Business Can Take Now to Avoid Paying a Ransom Later

The number of ransomware attacks have exploded in 2021 — and so, too, have the size of the ransoms. Here are eight actions that companies can […]
August 26, 2021

Ransomware is Evolving to New Heights

Ransomware has changed very quickly during the last few years. This type of malware is known for its data encryption element, but that tactic is being […]
May 3, 2021

Think Twice Before You Buy That Cheap Charger

In online marketplaces, it is easy to shop for the best deal. However, buying the cheapest charger for your smartphone is risky. Here’s why.
April 29, 2021

Microsoft Announces SolarWinds Hackers Have Downloaded Its Source Code

The hackers who used SolarWinds software to conduct a cyber attack against the U.S. federal supply chain in 2020 also gained access to Microsoft’s internal network. […]