A keylogger found in HP laptops
Are you using an HP laptop? If so, your machine…
Google improves Chrome’s security settings
Most web browsers have built-in security measures to protect users,…
Hackers exploit vulnerable Office feature
As the world’s most popular productivity suite, Microsoft Office tends…
What you can learn from Equifax’s leak
When it comes to security, it’s better to be safe…
How SaaS can benefit your business
As technology progresses, more solutions are created to help businesses…
New Locky ransomware: what you need to know
In 2016, the Locky ransomware infected millions of users with…
How to secure your IoT devices
More firms are using the Internet of Things (IoT) to…
Wikileaks details router vulnerabilities
When we write about how antivirus software isn’t enough to…