by bct2mastertemp | Apr 13, 2022 | Blog
Microsoft recently announced that it was doing a bit of re-branding. The company’s apps that connect Android and iPhones to your Windows PC were formally called “Your Phone.” Under the new re-naming scheme, those apps will now be called “Phone...
by bct2mastertemp | Apr 12, 2022 | Blog
Diana Lopera is a researcher for Trustwave Cybersecurity and has stumbled across something that’s one part interesting and one part disturbing. Apparently, a group of hackers are trying a new approach to distribute their malicious code which is leveraging...
by bct2mastertemp | Apr 11, 2022 | Blog
Do you use Microsoft PowerToys? If you’re not sure what that is then you probably don’t. If you’re curious, Microsoft has an open-source set of tools called PowerToys which is designed to allow power users to customize their Windows environments to...
by bct2mastertemp | Apr 9, 2022 | Blog
If you follow the global threat landscape closely, then you may already be aware of a notorious Chinese hacking collective known as “Storm Cloud.” What few people know is that this group seems to be the driving force behind a new variant of malware that...
by bct2mastertemp | Apr 8, 2022 | Blog
Online photography platform Shutterfly is the latest high-profile company to fall victim to a hacking attack. The company recently disclosed that in December of last year (2021) they were targeted by the Conti gang, who successfully breached their system and...
by bct2mastertemp | Apr 7, 2022 | Blog
It’s no secret that the pandemic changed the way much of the world works. Tens of millions of people are now working from home with millions more eyeing that as a very real possibility. Unfortunately, the pandemic also changed what kinds of opportunities...