IoT Scanner Checks for Vulnerabilities In Your Connected Devices

Monday, October 24th, 2016

Last week’s DDoS attack on Dyn that shut down portions of the internet was fueled by bots created from hacked connected devices, like internet-connected cameras and DVRs, but can also theoretically include connected routers, printers, and more. While there’s not exactly a fix for this problem, IoT Scanner is a ...

Easy-to-exploit rooting flaw puts Linux computers at risk

Friday, October 21st, 2016

The maintainers of Linux distributions are rushing to patch a privilege escalation vulnerability that's already being exploited in the wild and poses a serious risk to servers, desktops and other devices that run the OS. The vulnerability, tracked as CVE-2016-5195, has existed in the Linux kernel for the past nine years. ...

Remove ransomware infections from your PC using these free tools

Friday, October 7th, 2016

Ransomware, a variety of malware which encrypts user files and demands payment in return for a key, has become a major threat to businesses and the average user alike. Coming in a variety of forms, ransomware most often compromises PCs through phishing campaigns and fraudulent emails. Once a PC is infected, ...

10 easy ways to prevent malware infection

Friday, August 26th, 2016

We told you how to tell if you’re infected with malware. We told you how to clean up the infection if you get it. How about how to stop the infection from happening in the first place? Yes, it’s possible to clean up an infected computer and fully remove malware from ...

Google Chrome will start blocking all Flash content next month

Wednesday, August 10th, 2016

Flash was an integral part of the internet in years past, but it has also been a drag on performance and the source of a great many security vulnerabilities. Today, HTML5 is a better way to get the same sort of interactive content running on the web, and it works ...