by bct2mastertemp | Sep 1, 2022 | Blog
Quantum computing is on the horizon. Unfortunately, it’s been on the horizon for at least two decades. It’s one of those technologies that’s always “just around the corner.” In recent years, however, several important strides have been...
by bct2mastertemp | Aug 31, 2022 | Blog
According to ongoing research by Group-IB, a massive phishing campaign is currently underway. This is a campaign that has impacted no less than 130 organizations across a broad range of industries. These include but are not limited to professional recruiting firms and...
by bct2mastertemp | Aug 30, 2022 | Blog
Do you make use of the “MyChart” portal to refill prescriptions, contact your healthcare providers or make appointments? If so, you should know that recently, the healthcare giant Novant disclosed a data breach that impacted more than 1.3 million...
by bct2mastertemp | Aug 29, 2022 | Blog
Using different passwords on every website and storing them in a secure password manager is a standard best practice in data security. It’s generally good advice, but what happens when the makers of password vaults get hacked? That’s what the more than...
by bct2mastertemp | Aug 27, 2022 | Blog
Do you have the Kali Linux distribution running on one of the machines you own? If you’re not sure what that is, then you almost certainly don’t. Kali is a Linux distro used mostly by “ethical hackers” who use it mainly to perform security...
by bct2mastertemp | Aug 26, 2022 | Blog
MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system. Unfortunately, no system is bullet proof. There’s a way that a determined attacker could bypass sandbox restrictions and execute...