Log4j Vulnerability – Am I At Risk?
Just recently, popular cloud services such as Steam and iCloud, as well as apps like Amazon and Twitter were reportedly vulnerable to attack by logging utility Log4j. As reported by Ars Technica, Minecraft was the first to discover the Log4j vulnerability. Their services warned of an actively circulating attack code that exploited the vulnerability to […]
Continue Reading...Apple Devices Targeted by Pegasus Spyware – Update to 14.8
Apple Devices Targeted by Pegasus – What? We are all vulnerable to digital spying, albeit the recommended protections have been put into place for our protections. The latest in cyber security threats is Apple devices targeted by Pegasus Spyware. Devices running iOS (iPhones, Apple Watches, iPads, Laptops) version 14.6 and lower are in jeopardy. The […]
Continue Reading...TLS 1.3 Why Your Emails Just Stopped Working
As the world moves further and further into the cloud, securing the cloud becomes increasingly important. There are an uncountable amount of security protocols which are constantly improved and reinvented to make everyone’s online presence that much safer. As new updates are welcomed, older protocols become unsupported due to discovered exploits and holes; which can […]
Continue Reading...Data Security and Two-Factor Authentication (TFA)
What is Two Factor Authentication? You may have heard the of the term Two Factor Authentication (TFA) and been using it without even knowing. This feature has been widely used for years, yet recently, due to the increased security breaches and changes in compliance, it’s mainstream use is growing. Have you ever wondered why your […]
Continue Reading...