Blog
April 15, 2016 by Vertical Axion
If you use Google Chrome, you might have the “Better History” extension installed. If you do, and you’ve upgraded it recently, you’ve probably seen a large influx of advertising on your screen. Yes, you guessed it, hackers have found yet …
Read more »
April 14, 2016 by Vertical Axion
You’ve probably heard that last year, Trump Hotels were successfully breached, and an unknown number of customer credit cards compromised. In fact, what makes last year’s breach of Trump Hotels remarkable as compared to the breaches of a number of …
April 13, 2016 by Vertical Axion
Apple reports that it has fixed a security issue you may not have known existed. The problem occurred only with the iPhone 6 and 6s Plus devices, and was specific to images. Here’s how it worked, prior to the fix:…
April 12, 2016 by Vertical Axion
Browser extensions are in the news lately, and not just for Firefox. Recently, hackers have corrupted several Google Chrome extensions, and are using them to display unwanted ads to unsuspecting users. For Firefox though, matters are a fair bit worse. …
April 11, 2016 by Vertical Axion
Your employees are your biggest, most important, most valuable asset. Everybody who knows anything about business understand that. Unfortunately, your biggest asset is also your biggest liability, at least when it comes to data security. Recently, SailPoint conducted its annual …
April 9, 2016 by Vertical Axion
Recently, internet security companies have been reporting increasing incidents of large numbers of emails being sent out with strange and distinctive subject lines. Typically they’re crafted as file names, and have image extensions like .tiff, .jpg and .png. They’re designed …
April 8, 2016 by Vertical Axion
Recently, CNBC ran an article on password security. Embedded in the article was a tool they invited readers to use to test the strength and integrity of their passwords. The tool was supposed to estimate how long it would take …
April 7, 2016 by Vertical Axion
There’s a new threat lurking just beyond the periphery of your network. It’s called USB Thief, and while it doesn’t quite measure up to the most sophisticated attacks currently making the rounds, it is definitely top-tier, and is raising eyebrows …
April 6, 2016 by Vertical Axion
It seems that Google never stops innovating and striving to improve the services it offers. Gmail, for instance, recently got some impressive upgrades that build on those rolled out previously, which aims to keep Gmail’s billion plus active users safer …
April 5, 2016 by Vertical Axion
There’s another new attack vector to beware of if you own an iPhone. This new attack, called AceDeceiver MITM is quite possibly the most convoluted attack the hackers have come up with yet, and stands as an excellent example of …
It seems that the era of explosive smartphone growth has come to an end. This fact will not surprise most of the people who watch the industry closely, and after all, it was inevitable at some point. There are now …
April 4, 2016 by Vertical Axion
April 2, 2016 by Vertical Axion
Microsoft really wants everyone who uses their OS to upgrade to Windows 10. In fact, this desire is so strong, that they’ve taken a remarkable step. Going forward, all new chipsets produced by Intel, AMD, Qualcomm, and others will only …
April 1, 2016 by Vertical Axion
Another week, another critical security flaw in Adobe Flash. This one isn’t quite as bad as the flaw found last year, but it’s close. If you haven’t been following the trials and tribulations of Adobe’s beleaguered Flash Player, last year, …
March 31, 2016 by Vertical Axion
In recent months, Apple has been increasingly on the receiving end of unwanted attention from the hacking community. Apple’s OS offerings have long been touted as being more robust and secure than Microsoft’s Windows, and so far, the company is …
March 30, 2016 by Vertical Axion
If you haven’t heard the term “whaling attack,” as it relates to the hacking community, you’re not alone. It’s a fairly recent phenomenon, and is a subset of the standard phishing attack, where hackers will contact employees of a company …
March 29, 2016 by Vertical Axion
One of the nation’s largest firms engaged in assisting other companies in dealing with data breaches has now confirmed that they themselves have suffered a data breach, this one affecting 1.5 million business clients. In a formal statement, a company …
March 28, 2016 by Vertical Axion
One of the worst things about taking business trips is the airplane WiFi. It’s a lesson in patience. More often than not, owing to the slow speeds and anemic bandwidth available, you’re better off not even trying to get anything …
March 26, 2016 by Vertical Axion
File this one away under things not to do. Not that you’d ever have a need to do this, but whatever you do, do not set your iPhone’s date to January 1, 1970. If you do, you stand a good …
March 25, 2016 by Vertical Axion
The short answer to the question posed by this article’s title is yes. Yes, your smart TV is listening to your personal conversations. It’s simply a part of the way the technology works. If you spend the money to buy …
March 24, 2016 by Vertical Axion
Is nothing safe from the hacking community? It seems as though everything is under assault these days. Antivirus and malware blocking software is struggling to keep pace. When those security holes get plugged, the hackers simply shift gears and switch …
March 23, 2016 by Vertical Axion
MasterCard has been experimenting with a new facial biometrics app, and is poised to roll it out in force later this year. The basic idea behind the technology is that it will employ facial recognition in the place of traditional …
March 22, 2016 by Vertical Axion
The magnetic stripes on the backs of credit and debit cards are problematic. The root of the problem is that they contain absolutely nothing in the way of security. The information they contain is completely unprotected and vulnerable to a …
March 21, 2016 by Vertical Axion
Have you secured your Wi-Fi connection yet? If not, your neighbors may be “borrowing” your internet connection. That poses some potential dangers to you, and could even set you up for some legal trouble, but how can you tell? There …
507-388-3880