It Really Is An Arms Race: Google 2FA Codes Being Intercepted
Catalin Cimpanu of Zero Day reports on an attack targeting Google Authenticator app. -Article
Catalin Cimpanu of Zero Day reports on an attack targeting Google Authenticator app. -Article
Brien Posey of ITPro Today reports on old method being used to deliver new threats. -Article
Most of your clients and prospects already have IoT in their businesses—unfortunately, about 80% of it is unsecure. Since many businesses have not secured their IoT, hackers are able to breach their clients’ networks through their IoT devices. That is ...
Lindsey ODonnell of Threat Post reports on novel way malware is being spread. -Article
Susan Bradley of AskWoody reports on Microsoft's update methods. -Article
Electronic Frontier Foundation reports on searches of travelers mobile devices. -Article
Ionut Ilascu of Bleeping Computer reports on ODT Files being used as an attack vector. -Article.
Forbes reports on a vulnerability in software installed on Dell computers. -Article. Please call us if you have any Dell desktops or laptops to see if we can help you remove ...
They missed the big takeaway; flawless backup performed and verified on a frequent basis, that is not accessible to ransomware is the Real Answer: ...
Malevolent agents hijack Windows Live tiles. -Article.