by Tom | Oct 16, 2017 | Blog
One of the most enticing credentials that hackers desire is your credit card number, along with its expiration date and the code on the back. Hackers are also willing to go great lengths to achieve their goal of stealing these credentials, even so far as to make...
by Tom | Oct 16, 2017 | Blog
A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2). WPA2 has...
by Tom | Oct 13, 2017 | Blog
While many youngsters enjoy it when their school shuts down, this was likely not the case in Flathead Valley, Montana, where the cybercriminal group ‘TheDarkOverlord Solutions’ targeted the entire Columbia Falls school district. This attack caused the three-day...
by Tom | Oct 11, 2017 | Blog
Have you ever accidentally closed a tab before you were done with it? It’s a classic case of clicking just a little too close to the X. We’ll walk you through how you can open up Google Chrome tabs, not just on your ordinary desktop web browser, but your Android...
by Tom | Oct 9, 2017 | Blog
Regardless of your feelings on the matter, the 2016 United States presidential election was an extremely divisive one–in no small part, due to the suspicion that the outcome of the election may have been significantly influenced by hacked voting machines. This...