There’s a lot of money to be made by selling things that don’t belong to you. That’s a lesson hackers around the world have learned very well. Their latest venture is selling other people’s internet bandwidth. You may not have […]
A new ransomware gang known as “LockFile” has recently burst onto the scene. They specifically target Microsoft Exchange servers to gain access then proceed to encrypt everything they can find. LockFile employs a trio of vulnerabilities that are collectively known […]
Are you a WhatsApp user? If you are you may have heard of the FMWhatsApp mod. It promises to improve the WhatsApp user experience by improving user privacy, giving access to custom chat themes, emoji packs from other social networking […]
Data is everything to a small business in this day and age – which means if you lose access or control of your data, you lose everything. As dramatic as that might sound, the data backs that up. According to […]
Google’s Android app is the most installed app of all time with more than 5 billion installations. That matters because recently the company reported the existence of a serious bug in the app’s latest update. The company had this to […]
You may not be familiar with the name “SteelSeries” unless you’re a gamer. The company makes an exceptional line of gaming gear including keyboards, mice, and gaming headsets. If you buy one of their devices you will undoubtedly use the […]
Some products are released with lots of fanfare. Others with very little. There was almost no fanfare behind the release of Windows Server 2022 but it is currently available to customers. Windows Server 2022 has been in development for more […]
Do you own any of the following Cisco UPnP (Universal Plug and Play) routers? RV110W RV130 RV130W Or RV215W If you do then you will want to replace your gear as quickly as possible. The small business VPN routers listed […]
US telecommunications giant T-Mobile is the latest big company to suffer from a successful hacking attack. The company is still cooperating with law enforcement and investigating an attack. Here are the details. A threat actor claimed to have made copies […]