Blog

New Hacking Method Looks Like A Locked Computer

Scammers have breathed new life into an old scam. For years, the old 'Law Enforcement Lock' trick has been used to cheat ...

Support For Many Microsoft Apps Will Stop In 2020

The year 2020 looks to be interesting and exciting in a variety of ways, but it also will usher in a tremendous ...

ISO Files Are Being Used To Deliver Malware

Researchers at Trustwave have observed a notable increase in the use of .ISO files to deliver malware. Hackers have relied on poisoned ...

Message Recall Feature May Be Added To Office 365

For a while now, Microsoft Outlook users have enjoyed a highly popular addition to their email service. In a nutshell, it allows ...

Kids Can Bypass Communication Limit Feature On iOS 13.3

If you have children that own Apple devices, be aware that the latest update for iOS 13.3 included a feature called Communications ...

Windows 10 Update Caused Issues With File Explorer

Have you already installed Windows 10, build 1909? If so, then you've probably noticed that the latest build update introduced a few ...

Citrix Applications Need Patch To Address Vulnerability

Researchers at Positive Technologies recently discovered a serious vulnerability in Citrix Enterprise products that threatens the security of more than 80,000 companies ...

FBI Sheds New Light On Ransomware Tactics

According to a recent FBI alert marked "TLP: AMBER," businesses should be on high alert for ransomware attacks. The alert reads, in ...

Data Breaches Continue With Three New High Profile Cases

As 2019 draws to a close, we can say definitively that the year has been another record-breaking one where data breaches are ...

Cashless Shopping Could Get Easier In the Future

For decades, futurists have been promising a cashless society and all the convenience that comes with it. So far though, the technology ...