by bct2mastertemp | Oct 24, 2020 | Blog
Skynet just took a step closer to becoming a reality. The word, of course, refers back to the hit movie, ‘Terminator,’ in which a computer network gained sentience and decided to do away with the human race. While Microsoft’s latest advances in AI...
by bct2mastertemp | Oct 23, 2020 | Blog
Intel has had more than its share of challenges over the last couple of years. Not the least of which included a whole family of new attack vectors that made headlines and caused panic around the world. This happened as hackers discovered new ways to attack machines...
by bct2mastertemp | Oct 22, 2020 | Blog
Selling network access is big business on underground hacking websites. Even worse, the business is growing at an alarming rate, according to a report recently published by cyber security firm KELA. According to their report, the number of ads found on hacking forums...
by bct2mastertemp | Oct 21, 2020 | Blog
Since Google introduced Google Analytics back in 2005, it has become the industry standard. A simple, free method of getting a bird’s eye view into who’s searching for what on the internet. Millions of business owners around the world rely on Google...
by bct2mastertemp | Oct 20, 2020 | Blog
The year 2020 could well be described as the Year of Ransomware. Security researchers around the globe who monitor such things have noted a sharp uptick in the use of ransomware this year, with well known threats like REvil, Ryuk, and Maze being the most common...
by bct2mastertemp | Oct 19, 2020 | Blog
Are you an Office 365 user? If so, be aware that Microsoft is adding some powerful new protections to the software suite, designed to make you safer. Hackers commonly target Office 365 users with a type of attack known as “Consent Phishing.” That basically...