Be Afraid of New Shellshock Exploit
We told you this day would come, and so it has. Remember all the warnings about how vulnerable the internet of objects was, because they lack even the most rudimentary of protections? ...
We told you this day would come, and so it has. Remember all the warnings about how vulnerable the internet of objects was, because they lack even the most rudimentary of protections? ...
Karsten Nohl, and Jakob Lell, a pair of techs working out of Secure Research Labs, seem to have discovered a weakness before the hackers have. The good news is that no hacker ...
The Internet Mavens in Silicon Valley have decided that the time of credit cards has come to an end. They seem less sure about what exactly will replace them. At the moment ...
Media monitoring is one of the components of competition monitoring. The basic idea is that you select various monitoring targets, then do a periodic sweep through various media channels to see how ...
Recently, Bluebox Security has discovered a serious security flaw in the Android OS that impacts all versions of the OS from 2.1 (Eclair) to 4.3 (Jellybean). In looking at the total number ...
Last week we got a glimpse into how far Google is willing to go to defend its position when they issued the following statement in a motion to dismiss a lawsuit filed against them: Just as a sender of a ...
HIPAA is proving to be a very expensive proposition to implement. From regular risk assessments to auditing access logs, the regulation does much to ...
The only way to insure your data is to back it up. Unfortunately, many businesses think they are backing up their files adequately only to find out that they’ve suffered a major loss. The worst time to find out that ...
Latest Technology Frustration for Our Tampa Small Business Clients Has an Easy Fix I just ran into an issue where three ...