Category Archives: Blog

Undelivered Mail Notification Could Be A Phishing Scam

Hackers are always on the lookout for new ways to freshen up time-tested techniques. Where time-tested techniques are concerned, few are older than the humble phishing email. In one form or another, it seeks to trick an unsuspecting user to innocently hand over sensitive information, like usernames and passwords that the hacker can then use […]

Apple Is Saying Goodbye To iTunes With New Service

It’s the end of an era.  In 2001, Apple introduced iTunes, which transformed the music industry. For the first time ever, it was possible to buy individual songs, transfer files, and automatically sync data. It was safe and secure, and people flocked to it in droves. The truth is that iTunes isn’t so much going away, as […]

New Malware Designed To Go After Linux Systems

Linux systems aren’t targeted by hackers as often as Windows and iOS-based systems, but they’re certainly not immune. Recently, security researchers have discovered a new strain of malware developed by Chinese hackers, specifically for the purpose of targeting Linux-based systems. The new malware has been dubbed ‘HiddenWasp’. It bears a number of features in common […]