Blog

Your Router May Be Infected To Serve Up Fake Ads

If you have never heard the term “steganography,” you’re not alone. It’s the art and science of hiding code inside image data. ...

Mac Thunderbolt Hack Could Leave Your Computer Vulnerable

Do you use any sort of Thunderbolt device on your Mac? If you do, and you haven’t been keeping your OS up ...

Google Creates New Operating System For Internet of Things

Google is about to change the game where the Internet of Things (IoT) is concerned. Recently, the company announced the release of ...

Update Flash Or Risk Vulnerability To Hackers

Yet more critical security flaws have been found in Adobe’s poor, beleaguered Flash Player. The company continues to fight gamely to keep ...

One Billion Yahoo Accounts Were Breached

This is a world record, although the honor of holding it is a dubious one. Yahoo recently announced that it was the ...

New Version Of Android Trojan Can Take Photos And More

If you haven’t heard of a Trojan called Tordow, you probably will soon. Security researchers have been aware of it since February ...

Problems Connecting To Internet? May Be A Windows 10 Issue

Microsoft made a mistake, and it could complicate your life. If you’ve got your computer set up to receive automatic updates, you ...

Hackers Can Now Change What You See On Your Monitor

Do you trust what your eyes tell you? If you’re looking at a computer monitor, that trust might be misplaced. At a ...

Oracle Micros Point of Sale Customers Reset Your Passwords

Does your company rely on Oracle Systems’ Micros to handle point of sale transactions? If so, you should change your password immediately. ...

New Bluetooth Is Coming And It Sounds Awesome

In late 2016 or early 2017, Bluetooth 5.0 will be released, and by all indications, this will be the version of the ...