by bct2mastertemp | May 20, 2019 | Blog
A team of security researchers have uncovered a serious flaw in several major email clients you need to be aware of. The flaw allows hackers to fake verified signatures, which gives their phishing and other email-based attacks the appearance of legitimacy. According...
by bct2mastertemp | May 18, 2019 | Blog
Do you use an Android App called ‘WiFi Finder’? If so, be advised that your network password has likely been exposed, based on research conducted by Sanyam Jain, of the GDI Foundation. Jain discovered an unprotected database online associated with the app...
by bct2mastertemp | May 17, 2019 | Blog
Do you frequent the website bodybuilding.com? If so, be advised that the site has been breached. According to a recent statement by the company behind the site, the breach occurred in February, 2019 and had its origins in a phishing email the company received back in...
by bct2mastertemp | May 16, 2019 | Blog
Industry experts have been predicting the death of the humble password for decades. To date, those predictions have amounted to nothing. Passwords are still with us, and still serve as the cornerstone of security, even as other measures have arisen alongside them to...
by bct2mastertemp | May 15, 2019 | Blog
Microsoft recently issued an important support document that your IT staff needs to be aware of. In part, their notice reads as follows: “Inappropriate drive reassignment can occur on eligible computers that have an external USB device or SD memory card attached...