by bct2mastertemp | Feb 12, 2020 | Blog
It’s easy to get caught up in the hype of popular movies. Hackers know this and are beginning to incorporate Oscar Nominated movies into their strategies. They’re using enticing images to bait unsuspecting users to install malware and lure them to phishing...
by bct2mastertemp | Feb 11, 2020 | Blog
There have been a dizzying number of high-profile data breaches in recent months, and now we have one more to add to the growing list. Health Share of Oregon is a Medicaid Coordinated Care Organization. They recently disclosed that they lost control of health and...
by bct2mastertemp | Feb 10, 2020 | Blog
If you use Google Chrome on a mobile device, you’ll notice something any time Google displays a list of sites. Let’s say for example, if you perform a search for a keyword on Google.com, each website’s favicon will be displayed next to the link. This...
by bct2mastertemp | Feb 8, 2020 | Blog
On January 17th of this year (2020), Microsoft discovered and disclosed the existence of a zero-day vulnerability. It was present in Internet Explorer versions 9 through 11. Hackers could display specially crafted websites that would allow them to remotely execute...
by bct2mastertemp | Feb 7, 2020 | Blog
Just about everyone has made use of Google Translate at one point or another. You find some text on a website written in a language you don’t understand, pop over to Google.com and within seconds, you know what the mystery text says. It’s a great feature,...