by Master User | Aug 25, 2016 | Blog
The unfortunate reality is that most instances of hacking occur from within a company itself. It’s true that the high profile cases that make the news are successful breaches from outside the company, but the statistics bear out the fact that this is less common than...
by Master User | Aug 24, 2016 | Blog
Do you trust what your eyes tell you? If you’re looking at a computer monitor, that trust might be misplaced. At a recent DEFCON presentation in Las Vegas, researchers demonstrated how it’s possible to hack into a monitor’s firmware and make changes to what a user...
by Master User | Aug 23, 2016 | Blog
Does your company rely on Oracle Systems’ Micros to handle point of sale transactions? If so, you should change your password immediately. The company has recently reported that a sophisticated Russian cybercrime syndicate has successfully breached their system,...
by Master User | Aug 22, 2016 | Blog
In late 2016 or early 2017, Bluetooth 5.0 will be released, and by all indications, this will be the version of the technology we’ve all been waiting for. It’s about to take a giant leap forward in terms of functionality. At present, Bluetooth’s primary purpose is to...
by Master User | Aug 20, 2016 | Blog
Battery life for mobile devices is their single biggest weakness. The greatest challenge in growing and managing the exploding “Internet of Things” isn’t the devices themselves, but rather, the power required to wirelessly transmit the data they’re reporting. Energy...
by Master User | Aug 19, 2016 | Blog
Security researchers from Check Point have unearthed a new vulnerability dubbed QuadRoot that leaves potentially 900 million or more Android-based smartphones vulnerable. The attack manifests when a user unwittingly installs specially designed malware which executes...