Colonial Pipeline Company recently paid $4.4 million dollars to get its data back after a ransomware attack, rekindling the debate of whether companies should give in […]
Mobile app developers may have exposed the personal data of over 100 million Android users to malicious actors, according to Check Point Research (CPR). The app research firm […]
Mobile devices are increasingly likely to be infected with malware, especially in developing markets. The economic and technological gap that already exists between the social classes […]
Malicious actors have been adding their own servers to the Tor network since January 2020, generally for the purpose of intercepting traffic from users accessing cryptocurrentcy […]
Cookies are a common target for hackers because they represent a major vulnerability in web applications. Multi-factor authentication (MFA) is a traditional approach to solving this […]
With the future looking brighter, companies are contemplating moving more IT operations to public clouds. Here are three things to keep in mind before doing so. […]
Every day, people are lured into clicking potentially dangerous links in phishing emails. Here are five lies that cybercriminals tell to get them to click those […]
It’s always exciting whenever Apple releases a new update for the iOS operating system. One of the biggest features to debut alongside iOS 14.0 back in […]
As third-party cookies become obsolete, Google prepares to run test trials of FLoC aka Federated Learning of Cohorts. Cohorts Explained FLoC is designed to collect data […]