Blog
10 Million Android Devices Have Been Infiltrated by GriftHorse Trojan Apps
Disguised as legitimate apps, the GriftHorse malware has found its way onto more than 10 million Android devices. Learn how to determine whether your phone is one of them. Mobile malware dubbed GriftHorse has found
Three Extremely Risky Practices to Avoid
A common question among businesses looking to improve their cybersecurity defenses is “Where should we focus our efforts?” A good place to start is to make sure your company is not engaging in risky practices.
How to Tame the “News and Interests” Box
Microsoft quietly added the new “News and interests” feature to the Windows 10 taskbar. This feature can launch without you explicitly starting it, causing a big box to block part of your computer screen. Find
What Businesses Need to Know about the Semiconductor Chip Shortage
The semiconductor chip shortage is real and not simply scarcity marketing. Find out why there is a chip shortage, the problems it is causing, and how businesses can cope with the situation.
T-Mobile Breach Exposed the Personal Data of 54 Million Customers
The T-Mobile data breach in August 2021 was massive. Find out what data was stolen, what T-Mobile is doing to help customers affected by the breach, and how to protect yourself even if you are
The Latest Data Breach & Why It Keeps Happening
The growing value of information is increasing the incentive of hackers to obtain data from both individuals and organizations. These incidents include ransomware attacks in which the perpetrator encrypts the victim’s data or threatens to