Samsung is upping the ante in the smartphone world. The company recently announced that they will be introducing 48-mp and 64-mp image sensors for smartphones launching in the fall of 2019. Both sensors employ the company’s Isocell Plus and Tetracell technology. The former was designed to reduce light leakage, and the latter utilizes four pixels […]
Category Archives: Blog
Amazon has a problem. If you’re an Amazon shopper, that means you have a problem. The company recently revealed that more than a hundred sellers using the company’s platform were victims of what the company is describing as an “extensive fraud operation.” Only a few specifics are known about the conduct of the fraud operation. […]
Google announced a pair of important security features of upcoming versions of its Chrome browser at this year’s I/O Developer Conference. Both changes are designed with the same goal in mind: To give users some additional tools to block or at least mitigate the threat of online tracking. The first of the two new features […]
Do you use Dell equipment at home or in your office? If so, then the recent discovery made by independent security researcher Bill Demirkapi should give you pause. Recently, Mr. Demrikapi discovered a flaw in the company’s SupportAssist utility that comes pre-installed on most Dell systems. If you have an older Dell, know that SupportAssist […]
This year’s Open Source Security and Risk Analysis Report analyzed the anonymized data of more than 1,200 commercial codebases from 2018. According to the report, managing open source risk continues to pose a significant challenge for industry. The Synopsys Cybersecurity Research Center produces the report, and found that 96 percent of the code bases they […]
Jeremiah Fowler, a researcher with Security Discovery recently found an unprotected Elasticsearch databased owned by a company called SkyMed on the internet. According to his findings the database was configured such that it was open and visible to any browser. This allows anyone who stumbles across it to edit, download, or even delete data without […]
Tech giant Google recently unveiled the next step in its plan to put more power in the hands of users when it comes to their own data. The most recent change involves the introduction of a new auto-delete feature tied to your Google account. It will allow you to set your Location History, Web data […]
There’s a new scam afoot that involves using Google Ads. We’re frankly surprised that it’s working, but apparently, it’s drawing some unsuspecting customers in. It appears to be an organized campaign. The unknown scam artists are creating ads with phrases like: “Amazon.com – Best place to get dream products. Best deals – Best support – […]
A team of security researchers have uncovered a serious flaw in several major email clients you need to be aware of. The flaw allows hackers to fake verified signatures, which gives their phishing and other email-based attacks the appearance of legitimacy. According to research conducted by the team, the following email clients are vulnerable […]