Blog

New USB Thief Trojan is Virtually Undetectable

There’s a new threat lurking just beyond the periphery of your network. It’s called USB Thief, and while it doesn’t quite measure ...

Gmail Gets Better With Possible Threat Notifications

It seems that Google never stops innovating and striving to improve the services it offers. Gmail, for instance, recently got some impressive ...

New Malware Can Hijack Your iPhone

There’s another new attack vector to beware of if you own an iPhone. This new attack, called AceDeceiver MITM is quite possibly ...

Smartphone Sales on the Decline For First Time

It seems that the era of explosive smartphone growth has come to an end. This fact will not surprise most of the ...

iPhone Hit with New Exploit

There’s another new attack vector to beware of if you own an iPhone. This new attack, called AceDeceiver MITM is quite possibly ...

Microsoft Upgrade Deadline Extended But Don’t Wait Too Long

Microsoft really wants everyone who uses their OS to upgrade to Windows 10. In fact, this desire is so strong, that they’ve ...

Hackers Can Compromise Your PC If You Don’t Update Flash

Another week, another critical security flaw in Adobe Flash. This one isn’t quite as bad as the flaw found last year, but ...

New Mac OS X Vulnerability Threatens All Versions

In recent months, Apple has been increasingly on the receiving end of unwanted attention from the hacking community. Apple’s OS offerings have ...

W-2 Tax Email Scam Has Employees Giving Out Personal Information

If you haven’t heard the term “whaling attack,” as it relates to the hacking community, you’re not alone. It’s a fairly recent ...

Verizon Hacked: Was Your Account Affected?

One of the nation’s largest firms engaged in assisting other companies in dealing with data breaches has now confirmed that they themselves ...