by bct2mastertemp | Nov 15, 2018 | Blog
The Radisson Hotel Group joins the ranks of globally-recognized brands to be on the receiving end of a successful hack. According to the company, a small percentage of their loyalty club members had some of their personal information accessed by an unauthorized and...
by bct2mastertemp | Nov 14, 2018 | Blog
A research team has found an exploit that allows hackers to decrypt and view encrypted files on a number of well-known SSD drives. They include: Samsung T5 Portable Samsung T3 Portable Samsung 850 EVO Samsung 840 EVO Crucial MX 300 Crucial MX 200 Crucial MX 100...
by bct2mastertemp | Nov 13, 2018 | Blog
In recent months, hackers around the world have been finding new ways to invade people’s privacy, hijacking an increasing number of cameras and microphones attached to smartphones and PCs. Apple is responding to the evolving threat by introducing a new layer of...
by bct2mastertemp | Nov 13, 2018 | Blog
Companies commonly outsource its accounting and bookkeeping duties, customer service, and HR management… so why should technical support be any different? It shouldn’t. Outsourcing provides a lot of benefits, especially to small businesses with limited resources....
by bct2mastertemp | Nov 12, 2018 | Blog
Intel just can’t seem to catch a break. By now, almost everyone has heard about the dreaded Spectre and Meltdown vulnerabilities which have been plaguing the chip maker since they were first discovered. Now, it seems there’s a new chip-based threat. This...