Can Computer Data Be Stolen Through Power Lines?
If you have an air-gapped computer, you probably think you're safe. You may think that barring physical access to the machine, no hacker could possibly steal the data on that […]
If you have an air-gapped computer, you probably think you're safe. You may think that barring physical access to the machine, no hacker could possibly steal the data on that […]
If you're downloading software from the web, be careful. Take the extra step of verifying that you're on the developer's website, because the hackers have a new trick up their […]
Panera Bread company is the latest to find itself in hot water. Recently, security researcher Dylan Houlihan discovered that the company had failed to encrypt (or otherwise protect) a file […]
The bad news just doesn't seem to stop where Intel and the Speectre vulnerability are concerned. The latest bit of news comes directly from Intel, as the company admits that […]
Microsoft recently made small but significant changes to its Office 365 subscription service and to OneDrive, which are often used in tandem. The goal is to make it easier for […]
First it was 55 million. Then 77 million. Now, it's 2.2 billion, or pretty much every user on Facebook. That's how many people should assume that their public profile information […]
Delta Airlines and Sears Corporation have both been notified of a data breach that has exposed the credit card information of some 100,000 Sears customers and "hundreds of thousands" of […]
Rumors have been circulating for years that Apple has plans in the works to cut Intel and their chips out of the equation, in preference for using their own custom […]
Last year's Wannacry attack was bad, but in many ways, it was a self-inflicted wound. According Webroot's recently published "Annual Threat Report," almost all of the machines that succumbed to […]
Congratulations to Adobe Flash Player for not being the software most targeted by hackers. Security vendor "Recorded Future" has just published their annual list of the software hackers most commonly […]
Social Media