Blog

Malware booby traps images to steal EMRs

Malware booby traps images to steal EMRs

Since 2011, the trojan Stegoloader has infected machines all over the U.S. with malware disguising itself as a pirated product key generator. Once deployed, the trojan steals electronic medical records and attacks system vulnerabilities. Although the healthcare industry has been the primary target, other businesses are not invulnerable.

Beware of this iPhone-crashing video

Beware of this iPhone-crashing video

iPhone users should be careful about opening suspicious videos circulating in the web. Recently, a bug in the form of a five-second MP4 clip has been passed around in online forums and video sharing websites. The brief video seems harmless at first, but when iPhone users unwittingly click on the video link, their phones begin to slow down and ultimately crash.

Android users’ information at risk?

Android users’ information at risk?

Android users may have been inadvertently exposed to a major data breach that could have tracked and transmitted a vast amount of information and data from Android devices to hubs and users in China. Some of this data includes call histories and text messages, and various other data that most users would prefer be kept private.

Important updates to Microsoft Paint

Important updates to Microsoft Paint

In many years, Windows users have been stuck with the same old Paint software, wondering whether improvements would ever be made. The day for change and innovation has finally come, and Microsoft has recently announced a new version called Microsoft Paint 3D. If you regularly rely on Microsoft Paint for basic graphics and image work, learn more about Microsoft Paint 3D and it’s benefits below.

Easy tips for preventing a costly data breach

Easy tips for preventing a costly data breach

Business technology has become one of the most important components for successful companies big and small. In an overwhelmingly digital landscape, businesses depend on IT for marketing, data storage, and financial transactions. And with that comes the need to secure every bit of private information cyber criminals might want to feast their eyes on.