by bct2mastertemp | Dec 6, 2019 | Blog
Since October 2018, Microsoft engineers have been tracking a new strain of malware specifically designed to target Windows machines. As malware goes, this one isn’t particularly dangerous. It’s not designed to mass delete files, lock your system down or...
by bct2mastertemp | Dec 5, 2019 | Blog
Are you a fan of Google’s Cloud Print service? It’s fantastic because it allows you to print from anywhere to anywhere, which makes it utterly invaluable. Like so many great services Google has introduced over the years, for a variety of reasons, the...
by bct2mastertemp | Dec 4, 2019 | Blog
Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base. Specifically, the breach revealed certain information belonging to a small number of the company’s prepaid cellphone...
by bct2mastertemp | Dec 3, 2019 | Blog
Early in 2019, a new strain of ransomware appeared. Called “DeathRansom,” its bark was initially much worse than its bite. Researchers quickly discovered that the new strain only pretended to encrypt a user’s files. If victims simply removed the...
by bct2mastertemp | Dec 2, 2019 | Blog
Zombieload is back. First discovered in May of this year, it was described as a successor to the infamous Meltdown attack. That was a data-leaking side-channel vulnerability that impacted all Intel processor generations from 2011 and beyond. Intel hasn’t had a...