NASA has big ambitions to put 4G internet on the moon, and has tasked Nokia with turning their dream into a reality. It seems like the next logical step, really, since 4G has basically conquered planet earth. It can even […]
Last year, Google made some important changes to their Chrome browser in a bid to increase user security. Among these changes was to default to “HTTPS” in the browser in an attempt to reduce the number of “man in the […]
Jiri Kropac, the head of ESET’s Threat Detection Labs, recently reported a new malware campaign to be aware of. This one is a bit different in terms of methodology. Hackers most commonly employ emails utilizing various social engineering tricks in […]
Password security has long been a thorn in the side of IT Security Professionals. It’s easy enough to understand why. Passwords are inconvenient from the perspective of users, which is why they tend to keep them as simple as possible, […]
Adobe continues to work at a feverish pace to address critical security vulnerabilities in its product line. Their most recent patch addresses a total of ten security flaws across the following four products: Photoshop Adobe Digital Editions Adobe Bridge RoboHelp […]
The Microsoft 365 Defender Threat Intelligence Team recently issued a dire warning that every IT professional should take seriously. They’ve discovered an emerging threat in the form of hackers utilizing legitimate “Contact Us” forms associated with Google websites to distribute […]
About eighteen months ago, a number of big mobile carriers got together to create the “Cross-Carrier Messaging Initiative.” Their goal was to roll out a Rich Communication Services (RCS) platform designed to allow for text messaging across a variety of […]
Scammers have found a new way to take advantage of people, so be on your guard. The U.S. Department of Justice has recently issued an alert warning people of fake emails sent out asking recipients to take advantage of a […]
There’s a new cryptomining worm threat to be aware of, and it’s making the lives of IT Administrators who manage Windows and Linux environments nightmarish. This news comes from a recently published report offered by a research firm called Juniper, […]