Blog
April 5, 2016 by Vertical Axion
There’s another new attack vector to beware of if you own an iPhone. This new attack, called AceDeceiver MITM is quite possibly the most convoluted attack the hackers have come up with yet, and stands as an excellent example of …
Read more »
It seems that the era of explosive smartphone growth has come to an end. This fact will not surprise most of the people who watch the industry closely, and after all, it was inevitable at some point. There are now …
April 4, 2016 by Vertical Axion
April 2, 2016 by Vertical Axion
Microsoft really wants everyone who uses their OS to upgrade to Windows 10. In fact, this desire is so strong, that they’ve taken a remarkable step. Going forward, all new chipsets produced by Intel, AMD, Qualcomm, and others will only …
April 1, 2016 by Vertical Axion
Another week, another critical security flaw in Adobe Flash. This one isn’t quite as bad as the flaw found last year, but it’s close. If you haven’t been following the trials and tribulations of Adobe’s beleaguered Flash Player, last year, …
March 31, 2016 by Vertical Axion
In recent months, Apple has been increasingly on the receiving end of unwanted attention from the hacking community. Apple’s OS offerings have long been touted as being more robust and secure than Microsoft’s Windows, and so far, the company is …
March 30, 2016 by Vertical Axion
If you haven’t heard the term “whaling attack,” as it relates to the hacking community, you’re not alone. It’s a fairly recent phenomenon, and is a subset of the standard phishing attack, where hackers will contact employees of a company …
March 29, 2016 by Vertical Axion
One of the nation’s largest firms engaged in assisting other companies in dealing with data breaches has now confirmed that they themselves have suffered a data breach, this one affecting 1.5 million business clients. In a formal statement, a company …
March 28, 2016 by Vertical Axion
One of the worst things about taking business trips is the airplane WiFi. It’s a lesson in patience. More often than not, owing to the slow speeds and anemic bandwidth available, you’re better off not even trying to get anything …
March 26, 2016 by Vertical Axion
File this one away under things not to do. Not that you’d ever have a need to do this, but whatever you do, do not set your iPhone’s date to January 1, 1970. If you do, you stand a good …
March 25, 2016 by Vertical Axion
The short answer to the question posed by this article’s title is yes. Yes, your smart TV is listening to your personal conversations. It’s simply a part of the way the technology works. If you spend the money to buy …
March 24, 2016 by Vertical Axion
Is nothing safe from the hacking community? It seems as though everything is under assault these days. Antivirus and malware blocking software is struggling to keep pace. When those security holes get plugged, the hackers simply shift gears and switch …
March 23, 2016 by Vertical Axion
MasterCard has been experimenting with a new facial biometrics app, and is poised to roll it out in force later this year. The basic idea behind the technology is that it will employ facial recognition in the place of traditional …
March 22, 2016 by Vertical Axion
The magnetic stripes on the backs of credit and debit cards are problematic. The root of the problem is that they contain absolutely nothing in the way of security. The information they contain is completely unprotected and vulnerable to a …
March 21, 2016 by Vertical Axion
Have you secured your Wi-Fi connection yet? If not, your neighbors may be “borrowing” your internet connection. That poses some potential dangers to you, and could even set you up for some legal trouble, but how can you tell? There …
March 19, 2016 by Vertical Axion
Remember last year’s “Heartbleed” scare? If you don’t, or if you need a refresher, Heartbleed was a flaw in the security of SSL, which is the technology employed by just about everyone on the web to make financial transactions secure. …
March 18, 2016 by Vertical Axion
There are few things that strike terror into small business owners like having someone smear them, their company, or their brand online. Is it any wonder? We’ve all seen and heard horror stories about businesses being brought down by a …
March 17, 2016 by Vertical Axion
The US Department of Health and Human Services is having a tough time of it. They are the latest government agency to report a significant data breach, but this time, with a twist. In this instance, it wasn’t a nefarious …
March 16, 2016 by Vertical Axion
In many cases, when a hiring manager sees a resume for an open position from an obviously overqualified candidate, the immediate reaction is to toss it. Too often, they’re not even considered, on the thinking that because they are overqualified, …
March 15, 2016 by Vertical Axion
Wouldn’t it be great if you could find a free, high-quality group video conferencing solution, offered by a company with a proven track record for quality? Great news if you’ve been looking for something like that, because now, you can!…
March 14, 2016 by Vertical Axion
Remember the ‘Good ol’ days,’ when all hackers would try to do is breach your security, steal your files and crash your servers? Well, things are about to get a lot messier, and more expensive. Over the last few years, …
March 12, 2016 by Vertical Axion
Hardly a week goes by that there’s not some or other high profile hacking attack or data breach in the news. These headline making attacks get the lion’s share of the attention because of their scope and scale, seeing the …
March 11, 2016 by Vertical Axion
It finally happened. Ransomware has officially made its first appearance on OSX. Anyone who downloaded version 2.90 of the “Transmission” App (which is a legitimate Bittorrent app available in the Apple Store) on or around March 4 should delete it …
March 10, 2016 by Vertical Axion
Software companies seem to be losing their longstanding battle with the hacking community. In a recent blog post, Eric P. Maurice, who is the director of Software Security Assurance for Oracle, reported a devastating new software vulnerability that, while somewhat …
507-388-3880