Category Archives: Blog

Samsung Will Soon Offer Smartphones With 64MP Image Sensor

Samsung is upping the ante in the smartphone world. The company recently announced that they will be introducing 48-mp and 64-mp image sensors for smartphones launching in the fall of 2019. Both sensors employ the company’s Isocell Plus and Tetracell technology. The former was designed to reduce light leakage, and the latter utilizes four pixels […]

Amazon Sellers Dealing With Increased Hacking And Fraud

Amazon has a problem. If you’re an Amazon shopper, that means you have a problem. The company recently revealed that more than a hundred sellers using the company’s platform were victims of what the company is describing as an “extensive fraud operation.” Only a few specifics are known about the conduct of the fraud operation. […]

Chrome Will Offer More Ways To Control Web Tracking

Google announced a pair of important security features of upcoming versions of its Chrome browser at this year’s I/O Developer Conference. Both changes are designed with the same goal in mind: To give users some additional tools to block or at least mitigate the threat of online tracking. The first of the two new features […]

Some Dell Systems Are At Risk Of New Hacks

Do you use Dell equipment at home or in your office? If so, then the recent discovery made by independent security researcher Bill Demirkapi should give you pause. Recently, Mr. Demrikapi discovered a flaw in the company’s SupportAssist utility that comes pre-installed on most Dell systems. If you have an older Dell, know that SupportAssist […]

Security Is Now A Concern For Open Source Software

This year’s Open Source Security and Risk Analysis Report analyzed the anonymized data of more than 1,200 commercial codebases from 2018. According to the report, managing open source risk continues to pose a significant challenge for industry. The Synopsys Cybersecurity Research Center produces the report, and found that 96 percent of the code bases they […]

Stolen Personal And Medical Information Was Found Online

Jeremiah Fowler, a researcher with Security Discovery recently found an unprotected Elasticsearch databased owned by a company called SkyMed on the internet.  According to his findings the database was configured such that it was open and visible to any browser. This allows anyone who stumbles across it to edit, download, or even delete data without […]

Google Giving More Flexibility To Private Data Removal

Tech giant Google recently unveiled the next step in its plan to put more power in the hands of users when it comes to their own data.  The most recent change involves the introduction of a new auto-delete feature tied to your Google account. It will allow you to set your Location History, Web data […]

Scammers Now Use Google Ads To Steal Information

There’s a new scam afoot that involves using Google Ads. We’re frankly surprised that it’s working, but apparently, it’s drawing some unsuspecting customers in. It appears to be an organized campaign. The unknown scam artists are creating ads with phrases like: “Amazon.com – Best place to get dream products. Best deals – Best support – […]

Email Providers Found To Have Signature Vulnerabilities

A team of security researchers have uncovered a serious flaw in several major email clients you need to be aware of. The flaw allows hackers to fake verified signatures, which gives their phishing and other email-based attacks the appearance of legitimacy.   According to research conducted by the team, the following email clients are vulnerable […]