Latest Articles

BLOG

Update Your All In One SEO Plugin For Security Patch

Do you own and operate a WordPress website?  Do you also use the "All in One" SEO plugin? If you answered yes to both of those questions, then be aware that you'll ...

Reasons The Log4j Java Library Security Issue Is Concerning

Haven't heard of Log4j before right now? If not, you're certainly not alone but unfortunately it's something you're likely to hear more about in the weeks ahead. It may wind up being ...

Some Lenovo Laptops Have Admin Level Security Vulnerability

Do you own a Lenovo Yoga or ThinkPad laptop?  If so be advised that a pair of critical security flaws have recently been found that could allow an attacker Admin level access ...

This Android Banking Malware Is Back

We haven't heard much about Anubis in recent months. Anubis is the nasty Android-based banking Trojan that has made headlines on more than one occasion. If history is any guide at all ...

Microsoft Teams Gets End To End Encryption

Two months ago, Microsoft began rolling out support for end-to-end encryption for all Teams calls.  Given the pandemic and the increased demand for Teams and services like it, that was a very ...

AWS Outage Caused Major Headaches For Businesses

If yours is one of the thousands of businesses that rely on Amazon Web Services (AWS for short) then you're already aware that recently there were issues. Even if your business doesn't ...

Android Can Track AirTags And Similar Devices With New App

The Apple and Android ecosystems just took another step toward melding together with the release of a new App built by Apple. The app allows Android devices to track any nearby device ...

Website Ranking Company Alexa Will Be Shut Down

It's the end of an era.  Alexa.com is an iconic website run by Amazon that ranks and analyzes the popularity of other sites on the web. This site is soon to be ...

Voice Commands Getting New Attention In Windows 11

For a few years now Microsoft has been experimenting with voice commands.  Their early experiments were limited to contexts that resided wholly inside specific applications however. For example, once you opened Word ...

QNAP Still Dealing With Attacks On NAS Devices

QNAP has recently warned its customers of an ongoing campaign that is targeting QNAP NAS (Network Attached Storage) devices and infecting them with cryptomining malware.  This particular campaign is deploying software designed ...