Although 2020 has been filled with many unfortunate events like the coronavirus pandemic, there have been some positive business developments. Here are three of them.
Also commonly referred to as the IoT for short, the Internet of Things is a term that refers to a massive, interconnected network of literally billions […]
AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what […]
The U.S. National Security Agency (NSA) recently published a list of the top publicly known vulnerabilities Chinese state-sponsored hackers exploit, several of which affect Microsoft and […]
WordPress sites running the File Manager plugin are being hounded by hackers, thanks to a critical vulnerability found in some of the plugin versions. Find out […]
A critical vulnerability in the Microsoft Netlogon Remote Protocol is leaving some companies open to attack. Here is what you need to know to determine if […]
Smishing, vishing, and whaling might sound ominous, but they are simply terms used to describe different types of phishing attacks. Find out how these attacks differ […]