Popular Fitness Site Endures A Customer Information Breach
Do you frequent the website bodybuilding.com? If so, be advised that the site has been breached. According to a recent statement by the company behind the site, the breach occurred […]
Do you frequent the website bodybuilding.com? If so, be advised that the site has been breached. According to a recent statement by the company behind the site, the breach occurred […]
Industry experts have been predicting the death of the humble password for decades. To date, those predictions have amounted to nothing. Passwords are still with us, and still serve as […]
Microsoft recently issued an important support document that your IT staff needs to be aware of. In part, their notice reads as follows: "Inappropriate drive reassignment can occur on eligible […]
Back in July 2017, Microsoft created a bit of an uproar when they released a build of Windows 10 that promoted their new Paint 3D app. Paired with the new […]
The venerable banking Trojan known as Q-bot is back in the news, having recently been spotted in the wild as part of a sophisticated new phishing campaign designed to claim […]
Apple recently made an update to their XProtect antivirus software, which is the company's built-in means of protecting Macs from virus threats. Patrick Wardle is one of the best-known Mac security […]
According to FBI statistics, in 2013 there were 991 tracked incidents of ransomware attacks against business, resulting in losses slightly exceeding half a million dollars. The number of incidents steadily […]
Twitter recently announced the addition of a new "Hide Replies" feature, which will give the platform's users a bit more control over conversations that stem from the tweets they make. […]
How much of the web's traffic would you estimate to be fake, if you had to guess? The answer to that question might surprise you. According to the 2019 Bad […]
A major Chinese developer is in hot water with Google from an extensive BuzzFeed investigation which revealed that the company's apps were abusing user permissions, allowing the company to commit […]