Many SMB’s and corporations have shied away from allowing or utilizing Android devices in the workplace, due to their possible security risks. Most of the security risks involved with Android are related to the open development nature of the system, which allows hackers easier access to the OS and makes it easier for them to […]

The initial sales pitch for Google Glass, a wearable device that allows the user to search the Internet, make phone calls and take photos and videos, has unofficially been declared dead. The company announced that the device would not be available to the public putting and end to Google Glass in an unceremonious and unexpected […]

In the last 10 years, cloud technology has grown from a simple means of storing and retrieving data to a means of running and managing your business and collaborating with suppliers, customers and other partners. If we examine the emerging trends in cloud technology, we see more people using this technology in more ways than […]

Like them or not, wearables are coming. Sales projections have them reaching as high as 130 million units across all types of wearable devices by 2018. The problem is that with wearables come some serious security risks that towers above anything we’ve seen so far. A New Type of Risk Right now, in today’s world, […]

Wi-Fi security has become both a hot topic and a major area of concern for both small businesses and individual consumers. A glance at the list of Wi-Fi connections that pop up on a user’s computer will show varying levels of security and the number of computers that are within range of accessing your computer’s […]

Perhaps one of the greatest things about the rise of high-speed wireless internet connectivity is that the whole world exists as one gigantic fishbowl now. Most development takes place in plain sight. In fact, it must by design these days, or it doesn’t get attention. If development doesn’t get attention, then it doesn’t get funding. […]

The first step in solving a problem that you have is admitting that you have it to begin with. To be able to do that, you have to be looking at the landscape in which the problem resides with eyes that want to see it and know where to look. In the case of “Shadow […]

It has been said over and over, and proven by research and real life experience, that technology can be used to effectively increase productivity. One of the questions that is not often addressed is how a company, regardless of size, go from zero tech to productivity tech without interrupting the daily workflow and losing productivity […]

If you use Panda’s free antivirus software, you could be in some trouble. There’s a problem with the software in that it identifies itself as malware, and puts core files into quarantine. When it does that, if you reboot your PC, odds are good that it won’t boot up again. It won’t be able to, […]

Google’s “Project Zero” security initiative is bearing fruit, unearthing security issues we’ve never seen before, in hopes of getting them patched before the hacking community can begin to exploit them. In this instance, the hack has nothing to do with software, but with RAM, making it an exceptionally dangerous, exotic bug. The technique, dubbed “Rowhammer” […]