New Spectre-style attack discovered

New Spectre-style attack discovered

Security experts are constantly discovering new potential threats, and quite recently, they’ve found a new type of Spectre-style attack more dangerous than the original. Here’s a quick rundown of the new Spectre variant.

Spectre 101
For those who don’t know, Spectre is a vulnerability in modern computer chips like Intel and AMD that allows hackers to steal confidential information stored in an application’s memory, including passwords, instant messages, and emails.

Office 365 security considerations

Office 365 security considerations

It’s easy to see why Office 365 is an attractive solution for small and medium-sized businesses already familiar with the Office interface. More and more companies are making the move to the cloud, but there are security issues to consider.

Identify your company’s sensitive data…
Most files housed within your servers contain sensitive commercial and personal data that must be properly identified and protected.

The benefits of virtualization in 2018

The benefits of virtualization in 2018

The relationship between computer hardware and software can be frustrating. Both require the other to function properly, but both also require individual attention. Virtualization makes this relationship more flexible, and we’ve got a rundown on a few of the best examples.

4 steps to erase data from your old phone

4 steps to erase data from your old phone

Avast, a cybersecurity software company, purchased 20 used Android phones from eBay in 2014. Even though previous owners had performed a factory reset to erase all their private data from memory, the company was able to recover 40,000 photos (including nudes and kids’ pictures), 1,000 Google searches, 750 SMS and email exchanges, and tons of contact details.

HTTPS matters more for Chrome

HTTPS matters more for Chrome

HTTPS usage on the web has taken off as Chrome has evolved its security indicators. HTTPS has now become a requirement for many new browser features, and Chrome is dedicated to making it as easy as possible to set up HTTPS. Let’s take a look at how.

For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure HyperText Transfer Protocol (HTTPS) encryption.

Protect your Facebook and Twitter from hackers

Protect your Facebook and Twitter from hackers

In the wake of Facebook’s worldwide privacy scandal, it’s time to revisit some social media best practices. Your information is incredibly valuable, and you can’t rely on social media platforms to keep it safe from hackers. Heed these tips to make sure your Facebook and Twitter accounts are well secured.