How to Protect Your Small Business Against Fraud

By |January 14th, 2021|Cybersecurity, Security, Small Business|

Here are three steps you can follow to boost your security and keep scammers at bay. As a small business owner, you have many responsibilities to uphold to keep your company running efficiently. One of them is ensuring you have sufficient security measures in place to protect organizational and employee data [...]

Google: Be Careful Relying on 3rd Parties to Render Website Content

By |August 4th, 2020|Cybersecurity, Google Chrome, Security|

In the latest episode of Google’s Search Off the Record podcast, the Search Relations team discusses the challenges of relying on third parties for content. Google’s Martin Splitt cautions site owners about the challenges that come with using JavaScript content rendered by third-parties, such as blog comment sections. [...]

By |May 13th, 2020|Cybersecurity, Latest Articles, Security, Smartphones, Technology|

More than 4,000 Android apps that use Google's cloud-hosted Firebase databases are 'unknowingly' leaking sensitive information on their users Misconfiguration of Google Firebase, a popular mobile application development platform, has exposed databases of over 4000 Android apps. This app misconfiguration has exposed email addresses, usernames, passwords, phone numbers, [...]

Warning Issued For Millions Of Microsoft Windows 10 Users

By |March 3rd, 2020|Cybersecurity, Small Business, Technology, Windows 10|

Windows 10 free updates are still a thing, but the cost for users has been very high in recent months. And now users need to know about another fundamental vulnerability, one which Microsoft enables on all Windows 10 PCs by default. by Gordon Kelly Senior Contributor Consumer Tech I write [...]

New Chrome Password Stealer Sends Stolen Data to a MongoDB Database

By |December 1st, 2019|Cybersecurity, Google Chrome|

A new Windows trojan has been discovered that attempts to steal passwords stored in the Google Chrome browser. While this is nothing unique, what stands out is that the malware uses a remote MongoDB database to store the stolen passwords. By Lawrence Abrams This trojan is called CStealer, and like many other [...]

Stop using Internet Explorer immediately; also, why are you still using Internet Explorer?

By |September 25th, 2019|Cybersecurity, Google Chrome, Security, Technology|

Stop using Internet Explorer immediately; also, why are you still using Internet Explorer? We shouldn't still be having this conversation, but here we are. On Monday, Microsoft warned users of its once beloved Internet Explorer that a critical vulnerability in the browser allows malicious actors to [...]

Go to Top