by Tom | Jul 2, 2018 | Blog
Blockchain technology is mainly known for its use with cryptocurrencies. Even though the values of cryptocurrencies have leveled off after the incredible growth it has sustained over the past few months, users are still attempting to use cryptocurrencies to make a...
by Tom | Jun 25, 2018 | Blog
A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your...
by Tom | May 25, 2018 | Blog
Hundreds of millions of people use wireless Internet connections every day, and as a result, hackers are taking that as a challenge. They are now starting to develop malware that targets people through their routers. Recently, security researchers at Kaspersky Lab...
by Tom | Mar 29, 2018 | Blog
Have you ever heard of the physicist Erwin Schrödinger? He is most well-known for explaining a paradox related to quantum physics which involves a cat. Even though the theory behind Schrödinger’s cat is meant to explain something quite different, it can still be...
by Tom | Mar 16, 2018 | Blog
One of the crazy things about hackers is that they will do whatever it takes to ensure that they steal as much information and sensitive data as possible. One of the more innovative ways that hackers spread threats is through spam. Unwanted messages have grown from...