security

Is fileless malware a threat to you?

There have been some truly horrifying cyber-security headlines popping upRead more  "Is fileless malware a threat to you?"

6 years ago

Vulnerabilities on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of theRead more  "Vulnerabilities on WordPress websites"

6 years ago

Browsers leak sensitive info to hackers

The Autofill feature fills a void in the web browsingRead more  "Browsers leak sensitive info to hackers"

6 years ago

Flaw allows thieves to open locked iPads

Have you ever worried about your tablet’s security? If not,Read more  "Flaw allows thieves to open locked iPads"

6 years ago

Gooligan malware wreaks havoc on Android

Google has to contend with yet another malware attack thatRead more  "Gooligan malware wreaks havoc on Android"

6 years ago

Predicting cyber-threats in 2017

As 2017 rolls in, the threat of more formidable cyberRead more  "Predicting cyber-threats in 2017"

6 years ago

iPhone video bug crashes Apple devices

Apple iOS users beware — there’s a five-second video thatRead more  "iPhone video bug crashes Apple devices"

6 years ago

Potential security breach for Android users

Android users may have reason for concern regarding their deviceRead more  "Potential security breach for Android users"

6 years ago

Office 365 reveals new security features

Office 365 has given business owners access to online organizationalRead more  "Office 365 reveals new security features"

6 years ago

2 types of identity verification, explained

Cyber security is becoming more and more important in anRead more  "2 types of identity verification, explained"

6 years ago