Broswer hijacking can have serious consequences. In this post we provide an overview of browser hijacking attacks and explain how to protect against them.
By Marc Dahan
in Information Security
on July 25, 2024
250 million leaked conversations between Microsoft customer support agents and customers were left e
By Paul Bischoff
in Information Security
on May 30, 2021
Data loss can have serious implications for businesses. Despite this, a surprising number of businesses don’t have a recovery plan. Here are some more startling disaster recovery statistics.
By Mark Gill
in Data Recovery Software
on January 9, 2024
Your smart home gadgets can harbor hidden dangers! Learn what IoT malware is, how it infects devices, and how to protect yourself from these insidious threats to keep your connected world safe.
By Craig McCart
in Antivirus
on May 17, 2024
Mobile content management systems let you control the distribution and visibility of corporate data on mobile devices. Find out about MDM clients.
By Stephen Cooper
in Net Admin
on June 13, 2024
We explore IBM WebSphere Application Server, take a look at the Pros & Cons, and review the Best WebSphere Application Server Monitoring Tools.
By Liku Zelleke
in Net Admin
on April 3, 2024
Even with a monthly credit report included in the price, it's difficult to justify the limited prote
By Paul Bischoff
in Identity Theft Protection
on April 1, 2020
The Nigerian scam – also known as a 419 scam – is a form of advanced fee fraud that’s typically carried out via email. We look at its history, most recent convolutions and provide advice on identifying similar scams.
By Paul Bischoff
in Identity Theft Protection
on September 22, 2023
Software company, DATAIR Employee Benefit Systems, Inc., has started notifying people of a data brea
By Rebecca Moody
in News
on April 29, 2024
42 million user IDs and phone numbers for a third-party version of Telegram were exposed online without a password. The accounts belong to users in Iran, where the official Telegram app is blocked.
By Paul Bischoff
in Information Security
on March 30, 2020