by bct2mastertemp | Jul 28, 2022 | Blog
While “vishing” is by no means a new threat, it’s not something that has ever happened with sufficient frequency to get most people’s attention. So, if you haven’t heard the term before, you’re not alone. “Vishing” is...
by bct2mastertemp | Jul 27, 2022 | Blog
Data security isn’t something that’s at the forefront of most people’s minds, but it probably should be. These days, we use far more than just our trusty laptops and desktops to do real, meaningful work. Most people have a plethora of devices they...
by bct2mastertemp | Jul 16, 2022 | Blog
If you grew up in the days before the internet, it’s absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember when you had to pay for long distance telephone calls? That’s mostly a...
by bct2mastertemp | Jun 29, 2022 | Blog
Recently, Microsoft reported high severity security vulnerabilities in multiple apps offered by large international mobile service providers. What makes this especially noteworthy is the fact that these vulnerabilities aren’t app specific, but framework...
by bct2mastertemp | Jun 20, 2022 | Blog
If you’re deeply involved in IT security, you may already be familiar with the ERMAC Android banking trojan. If this is the first time you’re hearing of it, be aware that the hackers who authored the malicious code have recently released ERMAC 2.0, which...