Social engineering attacks are happening every day, and it is often the first technique hackers turn to, because "calling somebody on the phone is so much easier than doing the technical magic you need to break into a computer." Is your name and your phone number all it takes for a hacker to take over your cellphone account? ... Read More
- Published: 14 Dec 2018
Mobile devices – like smartphones, tablets, and the like – are expected to be used by 2.87 billion people by 2020. That’s a lot of devices, with a good portion of them contributing to business operations. Unfortunately, that’s also a lot of potential security issues if the right preparations aren’t taken in advance.
- Published: 05 Dec 2018
Smartphones and tablets are a double-edged sword for businesses: on the one hand, they are a great money saver if an employee is willing to use their own for business purposes, but this does leave your business vulnerable in a few ways. Fortunately, if the benefits are something you’re interested in, these vulnerabilities are simple
- Published: 22 Oct 2018
Maps are one of those very basic technologies that are always improving, starting as lines scratched into the ground and now living in our phones and giving us exponentially larger amounts of data. One of the first examples you may think of is Google Maps, which just got a few impressive updates that make the