Quickly reacting to a data breach can save a company time and money but preparing for one can save even more. With [...]
Cyber threats are continually evolving in complexity and volume, but the pandemic presents new opportunities for [...]
Recently, one or more Amazon employees disclosed customer email addresses to an unknown third party, prompting [...]
Google does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification [...]
Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, [...]
Deep Fakes are becoming an increasingly large problem. If you're not familiar with the term, a Deep Fake is an [...]
Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads.
WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible [...]
Sign up here to get the latest updates regarding cybersecurity, cloud computing, artificial intelligence (AI) and machine learning, as well as unified communications.