17 million UPnP devices at risk

As technology continues its creep into every aspect of our life, the number of Internet connected devices we use is also growing. This has led to an increase in the number and severity of security threats facing networks. It seems that almost every week a new security threat is uncovered. One of the latest can…

Details

Red October introduces advanced SpearPhishing techniques to cyber-espionage

During the past five years, a high-level cyber-espionage campaign has successfully infiltrated computer networks at diplomatic, governmental and scientific research organizations, gathering data and intelligence from mobile devices, computer systems and network equipment. Corporate Information Technologies (CIT) has also observed these infiltrations in commercial organizations, often unabated. “A layered cyber defense system that is capable…

Details

Learn about the Android Nexus

When it comes to mobile devices, users really only have the choice between a closed system with three incredibly popular devices, or an open system with hundreds of phones. For those who want choice, that system is Android. When researching devices, you are bound to hear about Android’s Nexus line, but might wonder, “what exactly…

Details