BLOG

Microsoft Considering Adding Meet Now Button For Online Meetings

The Coronavirus pandemic has changed a number of things about how the world works. One of the bigger and more noticeable changes is, of course, the fact that so many people are ...

Running And Bicycling App May Be Sharing Personal Data

Do you use the Strava app when you run or bike? If so, it may be sharing your personal information in ways you hadn't expected. Andrew Seward, the head of Data and ...

Popular Eyewear Provider Hit By Ransomware Attack

You may not be familiar with the name Luxottica, but the Italian-based eyewear manufacturer is the largest company of its kind in the world. It has popular brands such as Ferrari, Michael ...

Corporate Networks Being Targeted By New Ransomware

There's a new threat actor on the hacking world stage, going by the name "OldGremlin", and they're causing some serious damage to corporate networks around the world. The group's malware campaign seems ...

Data Breach Of Department Of Veterans Affairs

Hackers aren't picky when it comes to target selection, and no one is safe. Unfortunately, that includes the Department of Veterans Affairs, which recently disclosed that a hacker successfully breached their system ...

Staples May Have Exposed Some Of Its Customer Data

If you're a customer of US retail chain Staples, you may have recently received a notification from the company regarding a problem with their Order Tracking system. According to information in the ...

Nvidia Gets In The CPU Game With ARM Purchase

If you're more than a casual gamer, you're probably already quite familiar with Nvidia, one of the industry's leaders when it comes to graphics cards. Recently, the company announced a massive $40 ...

Microsoft Edge Browser Is Included With Latest Windows 10 Updates

Do you use Microsoft Edge? Unfortunately, Microsoft doesn't care whether you do or not, they're force-installing the browser on Windows 10 systems as part of their updates. Ostensibly, this is because the ...

Windows Makes Changes To Avoid Finger Command Security Vulnerability

Hackers use a variety of techniques to infiltrate systems and make off with data, but one of the more effective approaches is to use the system against itself. There are a number ...

Bluetooth Vulnerability Could Affect The Majority Of Devices

Do you have a smartphone, tablet, laptop or a "smart" device in your home? Or perhaps the better question is, how many of those devices do you have? Whatever your number is, ...