Our Blog

September 10, 2020

Mozilla Has Temporarily Shut Down Its Free File-Sharing Service Amid Growing Abuse

After receiving reports that cybercriminals were increasingly using Firefox Send to distribute malware, Mozilla took this file-sharing service offline. Find out why the service was commonly […]
September 8, 2020

3 Significant Developments in Ransomware Campaigns

Cybercriminals are continually trying to make their ransomware campaigns more effective. Here are three developments you should know about.
September 3, 2020

How to Protect Your Mobile Device from Malicious Apps

Researchers recently discovered a dozen malware-laden apps in the Google Play store. Learn about these apps and how to protect your mobile device from them.
August 31, 2020

What You Need to Know about the Zero Trust Model

Network infrastructures are getting more complex and thus harder to secure with traditional network security tools. Fortunately, there’s a viable alternative: the zero trust model. Here […]
August 27, 2020

Huawei Ban Spreads as 5G Network Approaches Rollout

Trade constraints interfere with mobilization of 5G network platform due to concerns of espionage, semiconductor sales and backdoor security risks.
July 30, 2020

Microsoft Is on a Mission to Eliminate Memory Bugs

Many of the vulnerabilities found in software are caused by memory-related coding bugs. Learn about an innovative technology that Microsoft developed to eradicate these bugs.
July 27, 2020

Windows 10 Bug Causes Connected Monitors to Go Black

A bug in Windows 10 Version 2004 is causing external monitors to go black when users try to draw using certain apps. Learn about this bug […]
July 23, 2020

How to Reinstall Windows 10 from the Cloud

The “Reset this PC” feature in Windows 10 Version 2004 has a new option that lets you reinstall Windows 10 using a fresh copy downloaded from […]
July 20, 2020

Protection Against a Data Breach and Protocols to Follow Once Affected

Securing data should be implemented in the beginning stages of every business model and continue throughout the life of the company.  A data breach can occur […]