Archive for February, 2017

Music Festival Coachella Attendee List Hacked, Including Passwords

If you’re a music lover and you’ve been to the website of the annual California music festival Coachella, then you are at risk. The entire Coachella database was recently found […]

Three Upcoming Technologies You Should Keep An Eye On

  Infratactix Three Upcoming Technologies You Should Keep An Eye On There is one truth about technology, it’s always changing. It seems as soon as you get the latest phone, […]

Websites Are Being Attacked – Time For A Security Update

WordPress is the reigning King of the Content Management Systems, and by extension, the king of much of the internet. More people use the platform than any other, and with […]

Macs Finally Experience Malware From New Office for Mac Macro Target

It’s an oldie but a goodie, and an attack vector that Windows users have seen since the late 90’s. Macros. These are essentially shortcut codes that Microsoft Word and other […]

Gmail No Longer Supports Windows XP, Vista

If, for some reason, you’re still running Windows XP or Vista, you probably already know that it’s well past time to upgrade. Microsoft officially ended support months ago, even for […]

Nokia Phones Might Be Back With New Smart Devices

Remember back in the early 2000’s when Nokia was the king of the cellphone market? Well, if you’re feeling nostalgic for those days, there’s (potentially) good news on the horizon. […]

Is Your Money Safe? Bank Cyberattacks On The Rise

Kaspersky Labs originally discovered “fileless malware” back in 2014, but it wasn’t until this year that it became mainstream. Now, the company is reporting that more than 150 banks around […]

Did Your Printer Receive A Message From A Hacker?

Over the weekend, a hacker who goes by the name Stackoverflowin performed a public service. Of course, in the process of doing so, he terrified and confused a lot of […]

SVG Images Getting Wider Distribution As Malicious File Type

JavaScript is hands down the tool of choice of hackers who are interested in inserting malicious code onto a user’s device. Most commonly, scripts are embedded in compressed (zipped) files, […]

New Memory That Acts As Processor Could Speed Up Devices

ReRAM is coming to a computer manufacturer near you, and soon. If you haven’t heard of this technology yet, you’re not alone, but it is one of the most exciting […]