Category Archives: Blog

If You Use Evernote Your Data May Have Been Exposed

Do you use Evernote Web Clipper for the Chrome web browser? If so, be advised that the developer recently reported that a critical flaw in the extension could allow hackers to access user information from third party online services. Online security company Guardio discovered the flaw and had this to say: “Due to Evernote’s widespread […]

Critical Flaw Found In Medical Device Pump Software

Researchers have recently discovered a pair of critical vulnerabilities in Alaris Gateway Workstations. These bring us closer to the tragic day when a hacker will actually be able to kill someone with code. Alaris workstations are used to deliver fluid medications. Given the severity of the flaws, a determined hacker could take full control over […]

Apple iCloud App Now Available On Windows 10

Great news for inter-operability.  Apple has brought their new iCloud app to the Microsoft Store for Windows 10 devices. Even better, the app is designed such that it’s deeply integrated with Windows 10, even allowing you to access iCloud files from inside other Windows apps. The version available on the Microsoft Store is identical to […]

AMCA Suffers A Medical Patient Information Breach

The recent hack of the American Medical Collection Agency (AMCA) is having ripple effects around the world. Recently it was reported that as a direct consequence of that hack, Quest Diagnostics (one of the largest diagnostic testing laboratory services in the United States) was breached. This resulted in the exposure of millions of patient records. […]

Undelivered Mail Notification Could Be A Phishing Scam

Hackers are always on the lookout for new ways to freshen up time-tested techniques. Where time-tested techniques are concerned, few are older than the humble phishing email. In one form or another, it seeks to trick an unsuspecting user to innocently hand over sensitive information, like usernames and passwords that the hacker can then use […]

Hackers Placing Hidden, Malicious Code In Media

If you’re not familiar with the term, ‘Steganography’ is the term used to describe the act of hiding code in images and video.  It’s a creative strategy that allows hackers to slip past even the most robust defenses. Recently, researchers at Kaspersky have discovered evidence of a novel approach to using steganographic techniques. They were […]

Microsoft Says Office 365 Users Should Use Spam Filter

Microsoft recently updated their support page and offered additional guidance to network admins as it relates to Office 365’s built-in spam filters.  The gist of the update is that they strongly advise against turning the auto-filters off. They provided some additional guidelines if you decide to bypass them for one reason or another. Here are […]

New Adware Discovered On Hundreds Of Androids Apps

Bad news for Android users.  Recently, Google discovered that more than two hundred apps on the Play Store had been infected with the ‘BeiTaAd’ plugin. This plugin is the latest in a large and growing collection of advertising libraries that have been misused and abused by advertisers. It should be noted that BeiTaAd didn’t start […]

Apple Is Saying Goodbye To iTunes With New Service

It’s the end of an era.  In 2001, Apple introduced iTunes, which transformed the music industry. For the first time ever, it was possible to buy individual songs, transfer files, and automatically sync data. It was safe and secure, and people flocked to it in droves. The truth is that iTunes isn’t so much going away, as […]