Gone are the days when you had to click to “accept” a download or install a software update in order to become infected. Now, just opening a compromised web page could allow dangerous code to install on your device. You just need to visit or “drive by” a web page, without stopping to click or ...
Read Blog
As we all migrate towards using smartphones and tablets, we need to be aware of the risks associated with them. Most of us know that we need to protect our computers with security software, but we don’t always take that precaution with our mobile devices. In fact nearly 75% of Americans do not use mobile ...
Read Blog
It seems that almost every site on the Web requires a password. At least twice a week, I get an email from someone who wants me to join yet another site, which requires yet another username and password. You can cop out and use the same username and password combination, but that’s always possible since some ...
Read Blog
Do you? I do and I’ve been doing it since I said “I do.” And if you are married or at least in a committed lifelong relationship, knowing each other’s passwords is probably expected. Today, sharing passwords has become a sign of commitment, a signal of love and devotion, like a varsity sweater or friendship ...
Read Blog
There is no denying the fact that the world has gone wireless. With the explosion of smartphones and the “bring your own device” (BYOD) movement, it is not hard to believe that more than 85% of American adults own a mobile phone and over half of them use them access the Internet. Mobile apps are ...
Read Blog
Recently security researcher Ravi Borgaonkar discussed a vulnerability that caused a Samsung Galaxy SIII to return to a factory reset just by visiting a special website. Mobile phones have a number of useful codes (USSD/MMI) that can be typed on the dialer screen to bring up system information (IMEI, firmware version, etc.). Usually they are ...
Read Blog