Check out the latest business IT News.
If you spend any time at all on social media, you may have heard a lot of recent buzz about an app for both Android and iOS devices called “Sarahah,” which was developed by a Saudi developer. In Arabic, the word means “honesty,” and the app’s stated purpose is to give users a platform to…
Read MorePoint of Sale (POS) systems are notoriously easy to hack. Hardly a month goes by that we don’t hear of some vendor or another having had their POS system breached, exposing customer credit card and other personal data. It’s always the same story. X numbers of users are impacted, notified and told to watch their…
Read MoreYou may have heard the statistic from Google that less than 0.05 percent of Android devices downloaded malware in 2016. It’s a great statistic, and one that the company should be proud of. Here’s a statistic they’re not talking about nearly as much: this year, the number of successful ransomware attacks against Android devices has…
Read MoreGoogle is struggling to keep malware out of the Play Store these days. Recently, literally thousands of malicious apps were discovered, and Google has been busy banning them. This represents a significant reversal of fortunes for the tech giant, which in recent years has been able to brag about its success, relative to other companies,…
Read MoreIt’s no secret that 2017 is on track to beat 2016 handily in terms of the total number of network breaches, and sadly, 2016 was itself a record-breaking year. What is less well known is the fact that most of the successful breaches are accomplished via exploits that have been identified for literally years. This…
Read MoreDo you rely on the AccuWeather App to keep tabs on local weather conditions? If so, you’ll want to read this. According to an independent security researcher named Will Strafach, the AccuWeather app designed for iOS sends your location information to a firm called “Reveal Mobile,” which is a data monetization company. Based on Strafach’s…
Read MoreSecurity researchers from firms around the web are warning of a new email exploit that hackers can use to modify the contents of an email, even after it has been sent and delivered. Originally discovered by Francisco Ribeiro of the firm Mimecast, Ropemaker stands for “Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky,” and…
Read MoreWould modern life even be possible without Wi-Fi? There are many who don’t think so, and you may be one of them. One of the biggest problems with it, though, is that the range of the signal is quite limited. Get more than a couple hundred feet away from the source of the signal, and…
Read MoreFor a time, Locky ransomware was the scourge of the internet and was considered by many security experts to be the most widely distributed form of malware on the internet. Things change, however, and the internet marches on. Hackers latch on to the latest and greatest variants, and after a brief surge to the top,…
Read MoreRemember the global Wannacry ransomware attack? Remember the even more recent Petya attacks? You would think after either of these, IT professionals around the world would have stepped up and immediately implemented better, stronger and more robust security protocols, because as those attacks proved, if the hackers want to, they can bring not just individual…
Read More