by Master User | Jul 21, 2016 | Blog
By now, the headlines will scarcely surprise anyone. Yet another business has suffered a major data breach. This time, it was Omni Hotels, a luxury hotel chain. The breach, which was discovered on May 30, 2016, began December 23, 2015 and was not completely eradicated...
by Master User | Jul 20, 2016 | Blog
The world’s hackers are branching out. No longer content to simply breach the digital fortresses that today’s businesses and governments have become, they’re now beginning to turn their attention to automobiles, too. In recent weeks, four vehicles with electronic key...
by Master User | Jul 19, 2016 | Blog
In the old days, before the rise of the iPad and iPhone, hackers were mostly content to leave Apple alone. They had such a tiny slice of the computer market that it was generally deemed as being more trouble than it was worth to create a virus that would only impact...
by Master User | Jul 18, 2016 | Blog
Identity theft is a large, pervasive, and growing problem. In fact, statistics show that the instances of identity theft jumped a staggering 57% last year alone, this, according to figures from the fraud-prevention service Cifas. The firm’s research into the increase...
by Master User | Jul 16, 2016 | Blog
Most people engaged in legitimate business have no idea just how profitable hacking can be. Hummingbad is a case in point. Part of the “Hummer” family of Trojans, this bit of malware is the most widely installed Trojan on the mobile device ecosystem, impacting more...
by Master User | Jul 15, 2016 | Blog
Security researchers from Cisco’s Talos Group have discovered a huge and disturbing spike in spam emails containing a widely used ransomware called Zepto. In fact, the team has uncovered 137,731 such emails over just a four-day period, containing more than three...