Blog

Here’s How Employees Open the Door to Hackers

Yep, sorry, everyone… this is a real problem. In fact, it’s a HUGE problem. Your company’s vulnerability, in large part, comes from your employees. And with a little ...

iOS Gmail Users Will Be Able To Access Multiple Accounts

Earlier this year, Google introduced a new and improved Gmail that gave users virtually unlimited customization options. In addition to that, it included some exciting new AI-based features that cut down on ...

Yahoo Is Compensating Victims Of Their Massive Data Breach

Yahoo has the dubious honor of having been on the receiving end of the largest data breach in history. As a consequence, the company has recently agreed to pay $50 million in ...

Your Company’s Data was Hacked – Are You Legally Responsible?

So, who should be held responsible when a company’s data system gets breached? Historically, the CIO, the CISO, or both have shouldered the lion’s share of data breach responsibility; well over half ...

IBM Invests Billions To Purchase Popular Red Hat Linux

IBM has recently announced what is to be the largest open source acquisition in history.  They're buying Red Hat for a staggering $34 billion dollars.  This, as the saying goes, changes everything. ...

Deleting Your Google Search History Will Soon Be Easier

Google is rolling out some important changes that will make it easier for people who use their services to control their data. They're starting with their most widely used service, which is ...

Google Finally Cracking Down On Manufacturer Device Updates

Security in the Android ecosystem is awful.  There's just no other word to describe it. In large part, the blame for that can be placed at the feet of Google.  Although they ...

Hackers Now Targeting Girl Scouts, Raising Privacy Concerns

As far as hackers are concerned, no target is safe.  Not even the Girl Scouts. Recently, one of the Girl Scouts' official email accounts was accessed by an "unauthorized third party" and ...

Hidden Threats: Is Your Computer Secretly Mining Cryptocurrency?

Mining cryptocurrency used to require thousands of dollars worth of equipment to see any kind of meaningful return, but not anymore. Newer digital currencies like Monero, ByteCoin, and AEON have given would-be miners ...

Some Tumblr Users May Have Had Their Data Breached

Do you use Tumblr?  If so, be aware that your personal information may have been exposed. Tumblr recently added a feature called "Recommended Blogs" that presents you with a list of blogs ...