Security researchers from firms around the web are warning of a new email exploit that hackers can use to modify the contents of an email, even after it has been sent and delivered. Originally discovered by Francisco Ribeiro of the firm Mimecast, Ropemaker stands for...
Would modern life even be possible without Wi-Fi? There are many who don’t think so, and you may be one of them. One of the biggest problems with it, though, is that the range of the signal is quite limited. Get more than a couple hundred feet away from the source of...
Mac users have a new strain of malware to be concerned about. It is dubbed “Mughthesec,” which seems to be a new, improved, and more robust design, based on an older piece of malware known as the OperatorMac family. Among its improvements are the facts that it...
For a time, Locky ransomware was the scourge of the internet and was considered by many security experts to be the most widely distributed form of malware on the internet. Things change, however, and the internet marches on. Hackers latch on to the latest and greatest...
Remember the global Wannacry ransomware attack? Remember the even more recent Petya attacks? You would think after either of these, IT professionals around the world would have stepped up and immediately implemented better, stronger and more robust security protocols,...