(866) 695-2175 | Experiencing an IT Emergency?
Blog
March 12, 2020 by Vertical Axion
Another week, another data breach. This time, the target being US clothing retailer J. Crew. The company announced that sometime in April of 2019, an unknown group of hackers utilized a credential stuffing attack to breach one of the company’s databases and accessed some of its customer account data. Credential stuffing, as you may know, […]
Read more »
Tagged
March 11, 2020 by Vertical Axion
Since 2010, Google has been doing its part to help keep its massive user base safe. They introduced a small but critical service called Google Authenticator, which is used by a number of online accounts as a two-factor authentication layer. Google launched the service as an alternative to SMS-based one-time pass codes. While SMS-based codes […]
March 10, 2020 by Vertical Axion
A few years ago, the people who track such things announced that the PC had been dethroned. They said a slight majority of people were turning to their phones as their primary means of accessing the web. Since that time, the trend has continued. The Social Media Management Company Hootsuite and their partners, We Are […]
March 9, 2020 by Vertical Axion
Photos are a new kind of currency, and gaining in value. Clearview AI is a facial recognition startup used by hundreds of law enforcement agencies around the country. The company was hacked, giving the hackers access to literally billions of photographs. In addition to the images themselves, the hackers gained access to Clearview’s customer list. […]
March 7, 2020 by Vertical Axion
Every kid who grew up watching sci-fi has dreamed of the day when a Universal Translator would be available, making seamless communication possible and eliminating the language barrier entirely. That day hasn’t arrived yet, but Google is steadily marching toward that goal. The company has been making use of new machine learning and other advanced […]
March 6, 2020 by Vertical Axion
Nemty Ransomware isn’t an especially well-known threat, but it’s dangerous and should not be discounted. Recently, researchers have discovered an ongoing spam-email driven campaign that’s attempting to spread the ransomware far and wide. An unknown group of hackers are sending out what appear to be love letters from secret admirers in a broad pattern. They […]
March 5, 2020 by Vertical Axion
Microsoft Edge has been changed and improved many times. It is now Chromium-based, and is one important step closer to widespread release. At present, the new browser is available to Windows 10 Insiders in the “Release Preview” ring. It will remain there for at least a few weeks for testing. Assuming no major problems are […]
March 4, 2020 by Vertical Axion
It’s tax season, and if you’re like many people, you make use of one of the numerous e-file platforms offered by TurboTax, TaxAct, and similar companies. Unfortunately, tax season also presents a tremendous opportunity for hackers. So much that the IRS has issued a formal warning to accountants and taxpayers alike, urging them to enable […]
March 3, 2020 by Vertical Axion
In November of 2019, Microsoft made an announcement and gave users an early look at a new unified Office app designed specifically for Android and iOS devices. The purpose, of course, was to provide the essential functionality of Office in a faster, leaner, and lighter package that was better suited for use on mobile devices. […]
March 2, 2020 by Vertical Axion
Are you ready for the world of 5G? Even if you are, the available storage you have on your favorite devices may not be as robust as you’d like it to be. Anticipating this problem, Western Digital has announced a new bit of technology that will be available on the next generation of devices. The […]
February 29, 2020 by Vertical Axion
Finally, a smart device manufacturer is taking device security seriously, and that’s great news indeed. You may recall reading about a serious issue with Ring security systems recently. The news was that the security issue allowed hackers to commandeer user systems and spy on them. The hackers were sending the users messages and making disturbing […]