As our ability to keep private data safe and secure online continues to be tested day in and day out, be it political data firms or bad actors from other countries, it’s nice >>
As our ability to keep private data safe and secure online continues to be tested day in and day out, be it political data firms or bad actors from other countries, it’s nice >>
A nation-state developed a piece of malware so powerful that it can steal everything that’s happening on a computer without even being install on the target device itself. Instead, it resides on a >>
Last week, the world learned that most computers and smartphones out there contain chips that come with severe hardware flaws that would allow hackers to target users with apps that easily extract highly >>
Macs are less likely to be infected by malicious apps than Windows computers, but they’re not immune to malware attacks. A fresh discovery details a dangerous kind of rogue program that can help >>
Any savvy iPhone or iPad user will tell you that popups requiring you to enter your Apple ID and password are a pretty common thing. It usually happens while you’re inside Apple’s stores >>
At this point, we assume that most savvy Android users know to be on the lookout for suspicious apps and download prompts, but even as smartphone users become more aware of the risks >>
Just because your hotel offers complimentary Wi-Fi, it doesn’t mean you have to take it. Hackers may be lurking, looking to compromise your computer, especially if you’re a high priority target staying at >>
In the last 12 months, we’ve had Wannacry, Russian election hacking, and a Gmail scam that hit millions. But we haven’t yet had a Hurricane Katrina-style cyberattack hit anywhere in the world. It’s >>