When it works, Android’s app permissions are awesome. They’re straightforward and easy to understand. When you install a new app on your phone, you’ll get a popup box that gives you a summary of what permissions the app says it needs. Then, you have the option to either accept or deny it that permission. Sometimes, […]
Category Archives: Blog
Yet another new ransomware family has been found in the wild, discovered independently by researchers at two separate security firms, Anomail and Intezer. The new strain has been dubbed “QNPCrypt” by Intezer and eCh0raix” by Anomail and is written in the Go programming language. When it encrypts files, it chances the file extension to “.encrypt” […]
Do you know someone that lost data due to a hard drive failure? Studies show that more than 40% of businesses that have catastrophic data loss fail within a few months. One way many business owners avoid this problem is by storing their data in The Cloud. In this video, we’ll outline three reasons […]
Do you own a Google Home? If so, you probably find it to be indispensable. It’s a powerful, genuinely helpful piece of technology, but there’s a catch. It’s so good and so useful because it listens constantly for voice commands from you. Those commands get recorded. Recently, Google acknowledged that it hires third-party contractors to […]
Apple is in the news again, but not for anything good. Jonathan Leitschuh, a security researcher, recently unearthed a serious security flaw that allowed a hacker to activate a Mac computer’s webcam without alerting the computer’s owner. The problem is a program called Zoom. The Zoom software installs a web server on the owner’s computer, […]
An UpGuard research team recently discovered several unsecured Amazon S3 buckets belonging to the Israeli IT Services firm Attunity. The company left the buckets unsecured, exposing more than a terabyte of sensitive information belong to a number of prominent companies including Ford, TD Bank and Netflix. To provide a sense of scale, Attunity has more […]