Blog

Hide & Seek malware: What you need to know
You probably think your Internet of Things (IoT) devices don’t need as much protection as your PCs or laptops. Newsflash: They’re actually even more vulnerable

Chrome: From HTTP to HTTPS
Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as

The dangers of app overload in businesses
Businesses today rely on countless apps and software for day-to-day operations. However, too many of these programs can do more harm than good. App overload

Facebook: 4th favorite choice for teens
Facebook’s 13-to-17-year-old users are declining despite the overall growth of the social media giant’s subscribers. A new survey by Pew Research Center found that only

Office 365 will block Flash by 2019
If you are one of the few Office 365 users who embeds Silverlight, Shockwave, or Flash content in your documents, your pastime will soon be

Mitigating healthcare insider threats
First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records

Nation-state hackers inflict destructive malware
A week ago, leading cyber threat intelligence team Cisco Talos reported that no less than 500,000 IoT devices in up to 54 countries were infected

Can the “Black Dot” bug be fixed?
People who use iPhones, iPads, and Macs are at risk of encountering a Unicode attack that can cause the messaging app to crash and lock

How to configure your new Windows 10 laptop
First things first, what should you do with your brand new laptop? You go through the Windows 10 setup, and you’re all done, right? Not