by bct2mastertemp | Aug 9, 2018 | Blog
There’s a new, surprisingly elaborate phishing scam targeting iPhone users. The scam starts with an email informing users that their phones have been locked due to “illegal activity” and instructing them to call “Apple Care” to get the...
by bct2mastertemp | Aug 8, 2018 | Blog
A dark day for Lifelock, the Identity Theft Protection company. It has recently come to light that the company may have accidentally exposed their customers to additional attacks. They recently fixed a vulnerability on their website that allowed anyone with a browser...
by bct2mastertemp | Aug 7, 2018 | Blog
Microsoft has made numerous ventures into the smartphone ecosystem, but so far, they’ve only been met with limited success. This time, they’re trying something a little different. Instead of making their own Windows-based phones, they’ve created a...
by bct2mastertemp | Aug 6, 2018 | Blog
File this away under things you already knew. Coronet recently released a report entitled “Attention All Passengers: Airport Networks Are Putting Your Devices & Cloud Apps At Severe Risk,” and the news is about what you’d expect. The report...
by bct2mastertemp | Aug 4, 2018 | Blog
Twitter has long had a reputation for being at the mercy of bots that have been used to sway public discourse and opinion. Often, these bots are controlled via Twitter API apps that allow the authors to automate most of their actions, such as tweets, follows, and...