Do you own an iPhone 8? If so, you may have problems. Apple has recently reported that a small percentage of iPhone 8s “contain logic boards with a manufacturing defect. Affected devices may experience unexpected restarts, a frozen screen, or won’t turn on.” The company has isolated the defect to …
Most Small Businesses Can’t Recover From Cyber Breaches
A new study recently published by Sitchfast Technologies paints a grim picture of the threat landscape for small and medium-sized business. Their key finding? A staggering 60 percent of small businesses that suffer a data breach of any magnitude go out of business within six months. Worse, one business owner …
Vulnerability Found In Major Manufacturers Of Android Phones
Researchers operating out of the University of Florida, Stony Brook University and Samsung Research America have made a disturbing discovery. Millions of Android smartphones manufactured by eleven different OEMs (Original Equipment Manufacturers) were found to be vulnerable to attack via AT Commands. If you’re not sure what an “AT Command” …
Security Issues Abound – Texas Voter Registration Records Leaked
The great state of Texas has 15.2 million registered voters. Unfortunately, personal details belonging to nearly all of them (14.8 million) have been compromised, but don’t blame the state’s election officials. This staggering breach was caused by the carelessness of a conservative-focused data firm, ironically named “The Data Trust.” They …
Hackers Now Targeting Point Of Sale Systems
There’s a new threat to point of sale (POS) systems coming out of Russia, according to security researchers from Booz Allen Hamilton. The malware, which they’re calling “RtPOS” isn’t bleeding edge technology, and does not approach the level of sophistication of other recently discovered strains, but that doesn’t mean it …
Hackers Make More Money Than Is Spent On Cybersecurity
Quick question – how much do the world’s cyber criminals make every sixty seconds? If you guessed a quarter of a million dollars, you’d be wrong. If you doubled that value, you’d be wrong again. According to research conducted by RiskIQ, cybercriminals are raking in a cool million dollars per …
High Frequency Audio Computer Monitors May Expose Screen Activity
It may sound like something straight out of a science fiction movie, but recently, researchers have made a disturbing discovery. Using nothing more than an off-the-shelf microphone, it’s possible for an attacker to determine what content you’re viewing on your computer monitor. The researchers tested a variety of LCD screens …
Millions Of T-Mobile Customers Data May Have Been Leaked
Telecommunications giant T-Mobile is the latest victim of a large-scale data breach, with personal data belonging to more than two million of its customers having been leaked. The exposed information included customer name, phone number, email address, billing zip code, account number and whether the account was pre-paid or post-paid. …
Survey Shows Teens Are Concerned About Their Screen Time
According to a recent survey conducted by Pew Research Center, 54 percent of teens say that they spend too much time on their cellphones. Acknowledging you have a problem is the first, necessary step toward correcting it, and the survey reports that significant percentages of teens are taking steps to …
Encrypted Chats Are Now Available In Skype
Earlier this year, Microsoft announced that it had entered into a partnership with Open Whisper Systems, the makers of the Signal app. The purpose of the partnership was to bring Signal’s open source, end-to-end encryption protocol to Skype. As of the latest Skype builds, that is now a reality. Stable …