by Master User | Apr 13, 2016 | Blog
Apple reports that it has fixed a security issue you may not have known existed. The problem occurred only with the iPhone 6 and 6s Plus devices, and was specific to images. Here’s how it worked, prior to the fix: Your phone, as you know, has a lock screen. Your phone...
by Master User | Apr 12, 2016 | Blog
Browser extensions are in the news lately, and not just for Firefox. Recently, hackers have corrupted several Google Chrome extensions, and are using them to display unwanted ads to unsuspecting users. For Firefox though, matters are a fair bit worse. It’s not just...
by Master User | Apr 11, 2016 | Blog
Your employees are your biggest, most important, most valuable asset. Everybody who knows anything about business understand that. Unfortunately, your biggest asset is also your biggest liability, at least when it comes to data security. Recently, SailPoint conducted...
by Master User | Apr 9, 2016 | Blog
Recently, internet security companies have been reporting increasing incidents of large numbers of emails being sent out with strange and distinctive subject lines. Typically they’re crafted as file names, and have image extensions like .tiff, .jpg and .png. They’re...
by Master User | Apr 8, 2016 | Blog
Recently, CNBC ran an article on password security. Embedded in the article was a tool they invited readers to use to test the strength and integrity of their passwords. The tool was supposed to estimate how long it would take a hacker to “crack” your password, and...
by Master User | Apr 7, 2016 | Blog
There’s a new threat lurking just beyond the periphery of your network. It’s called USB Thief, and while it doesn’t quite measure up to the most sophisticated attacks currently making the rounds, it is definitely top-tier, and is raising eyebrows as security...