by bct2mastertemp | Jul 9, 2019 | Blog
The hacker who calls himself ‘Gnosticplayers’ has been busy and prolific. Over the years, he’s sold more than one billion user accounts on the Dark Web. His most recent product is more than ten million user records for the social planning and...
by bct2mastertemp | Jul 8, 2019 | Blog
Researchers at the cybersecurity firm Anomali have discovered a completely new type of malware that’s disturbing on several levels. Worse is the fact that the researchers aren’t quite sure what it does. The new strain has been dubbed ‘IPStorm’...
by bct2mastertemp | Jul 6, 2019 | Blog
Do you use Evernote Web Clipper for the Chrome web browser? If so, be advised that the developer recently reported that a critical flaw in the extension could allow hackers to access user information from third party online services. Online security company Guardio...
by bct2mastertemp | Jul 5, 2019 | Blog
Researchers have recently discovered a pair of critical vulnerabilities in Alaris Gateway Workstations. These bring us closer to the tragic day when a hacker will actually be able to kill someone with code. Alaris workstations are used to deliver fluid medications....
by bct2mastertemp | Jul 4, 2019 | Blog
Great news for inter-operability. Apple has brought their new iCloud app to the Microsoft Store for Windows 10 devices. Even better, the app is designed such that it’s deeply integrated with Windows 10, even allowing you to access iCloud files from inside other...