You wouldn’t think a child’s toy could lead to a breach of your personal data. But this happens all the time. What about your trash can sitting outside? Is it a treasure trove for an identity thief trolling the neighborhood at night? Many everyday objects can lead to...
Scheduling appointments is a common activity. Salespeople often set up virtual appointments to answer questions about a product. Software companies allow people to schedule live demos. Telehealth therapists allow clients to book video sessions. Those are just a few...
Why Multi-Factor Authentication? Online accounts are frequent targets of attack, and attackers obtain or guess passwords in many ways, some of which are obvious and some of which are more sneaky. But the fact is, just a password is not enough to truly verify your...
What is it? Earlier this month, a vulnerability was announced in an open-source logging utility from Apache called “log4j” that is used extensively in many applications, both web-based and in locally-installed computer software. A patch was immediately available...
You may have experienced some issues with phone calls, either making or receiving them, today. The details are not fully known, but one of the large phone carriers providing internet phone service to around 40% of customers in the United States and Canada (as a...