Would Your Company Fail A Web Security Test?

July 26th, 2016

How solid is your firm’s web security? According to recent findings by the penetration expert Ilia Kolochenko, probably not very good. Kolochenko should know. He is the CEO of High-Tech Bridge, and he and his research team have just finished an extensive review of business internet vulnerabilities.

Will Your Next Hard Drive Be MRAM?

July 25th, 2016

There’s a new technology in the area of memory and storage. MRAM. If you haven’t heard of it, you’re not alone, but it’s one of two promising up and coming technologies that stand to change the storage game forever. The acronym stands for Magnetoresistive Random Access Memory, and there are three key things that make it much better than today’s storage and memory options.

Need More Laptop Drive Space? How About A 4TB SSD?

July 23rd, 2016

Samsung made a surprising new product offering with little fanfare. There was so little fanfare, in fact, that you may have missed it. The company is now selling a staggering 4TB SSD with a 2.5 inch form factor, which means it’s small enough to fit into a laptop.

Will Printers Serve Up Your Next Computer Infection?

July 22nd, 2016

Vectra Networks has found an old, longstanding vulnerability in Windows, and it comes from a rather unexpected source. Printers.

Way back in 2007, an eternity ago in the world of tech, Microsoft introduced a convenient new feature that was widely lauded by network administrators.

Latest Breach Hits Omni Hotels – Has Information Been Stolen?

July 21st, 2016

By now, the headlines will scarcely surprise anyone. Yet another business has suffered a major data breach. This time, it was Omni Hotels, a luxury hotel chain. The breach, which was discovered on May 30, 2016, began December 23, 2015 and was not completely eradicated from the company’s network until June 14, 2016.

Unfortunately, we do not have any information at this time as to how many customers may have been impacted, nor which specific hotel locations were infected.

Thieves Are Using Technology To Hack In And Steal Cars

July 20th, 2016

The world’s hackers are branching out. No longer content to simply breach the digital fortresses that today’s businesses and governments have become, they’re now beginning to turn their attention to automobiles, too. In recent weeks, four vehicles with electronic key FOBs and digital security measures have been stolen.

Mac Is The Focus of New Malware

July 19th, 2016

In the old days, before the rise of the iPad and iPhone, hackers were mostly content to leave Apple alone. They had such a tiny slice of the computer market that it was generally deemed as being more trouble than it was worth to create a virus that would only impact such a small number of devices.

Identity Thieves Use Social Media To Gain Personal Information

July 18th, 2016

Identity theft is a large, pervasive, and growing problem. In fact, statistics show that the instances of identity theft jumped a staggering 57% last year alone, this, according to figures from the fraud-prevention service Cifas.

The firm’s research into the increase of identity theft found that much of the growth has seen fraudsters targeting a younger demographic (ages 30 and under), with 24,000 victims in this age group in 2015, compared with 15,766 in 2014, and 11,000 victims in this age group in 2010.

In order to successfully assume a person’s identity, the first order of business is to obtain as much personal information as possible.

Android Users Infected By Malware Threat Known As Hummingbad

July 16th, 2016

Most people engaged in legitimate business have no idea just how profitable hacking can be. Hummingbad is a case in point. Part of the “Hummer” family of Trojans, this bit of malware is the most widely installed Trojan on the mobile device ecosystem, impacting more than two billion Android users worldwide.

Emails With Zepto Ransomware On The Rise

July 15th, 2016

Security researchers from Cisco’s Talos Group have discovered a huge and disturbing spike in spam emails containing a widely used ransomware called Zepto. In fact, the team has uncovered 137,731 such emails over just a four-day period, containing more than three thousand unique samples.