Most hacks and attacks introduced on this blog are blatantly malicious, looking to nab your valuable information. However, this may not be the case with app designer Darren Jones. Jones claims to have created his hack in order to prove that change is needed when it comes to photo messaging apps such as Snapchat. The ...
Read Blog
After years of telling users that Microsoft Security Essentials was enough to protect their PCs from security threats, Microsoft has begun to sing a different tune. In an interview conducted by PC Magazine, Microsoft’s Senior Program Manager of the Microsoft Malware Protection Center, Holly Stewart, admitted that Microsoft provides its users with only a “baseline” ...
Read Blog
We all know the saying, “sticks and stones may break my bones, but words will never hurt me,” however, as the incidence of cyberbullying grows across the Internet, this may no longer be true. On the Internet, hurtful words can become more visible and more brutal than ever and seen by a lot more people. ...
Read Blog
The ability to instantly share and interact through online sources has become an expected part of our daily lives. We live in a time where any service that helps make this happen is quickly welcomed. And because of this mentality, cloud services such as Dropbox, where people can access shared information and files in real-time ...
Read Blog
They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re ...
Read Blog
As a growing number of smartphone owners get increasingly comfortable using their mobile devices for everything from shopping online to depositing checks, cybercriminals are finding new ways to take advantage of our growing reliance on our smartphones and tablets. Savvy scammers equipped with Photoshop & some computer programming skills are looking to get your money ...
Read Blog
Good rule of thumb on the web: When it seems too good to be true, it probably is. Those ads on the right side of your web page, promising to give you a brand new iPad for absolutely free…probably a scam. The direct message on Twitter you received stating that you can make thousands of ...
Read Blog
Like something right out of George Orwell’s 1984, it turns out that Big Brother, or Big Hacker in this case, may in fact be watching you—through your television. Recent research shows that Smart TVs are just as vulnerable to a hacking attack as your home computer. After months of research and working with Smart TV ...
Read Blog
As everyday items become increasingly computerized and Internet-connected, the convenience and efficiency of our lives has improved more than we could have imagined. Like something out of the Jetsons, we are seeing numerous technological advancements applied to kitchen appliances and other everyday household items to optimize our experience. Refrigerators, thermostats, cars and more are connecting ...
Read Blog