The Security Risks Associated with Cookies

Cookies are a common target for hackers because they represent a major vulnerability in web applications. Multi-factor authentication (MFA) is a traditional approach to solving this problem, but it’s becoming less effective as attackers devise ways of defeating it. Web developers are using new methods like Progressive Web Apps (PWAs) to defend against modern attacks in the current cloud and …

Ethernet Technology: A Possible Comeback?

Ethernet is a family of wired technologies commonly used in local area networks (LAN) and wide area networks (WAN). It has been commercially available since 1980, but has been refined multiple times to support higher transmission rates, more nodes and longer distances while retaining much of its backward compatibility with older versions. Ethernet is still a key technology of the …

Apple Releases Patch for MacOS Big Sur Bug

Version 11 of the MacOS operating system (OS) for MacIntosh computers, commonly known as Big Sur, is the 17th and most current major release of this OS as of February 2021. It’s the successor to MacOS version 10.15, also known as Catalina. Apple publicly released Big Sur on November 12, 2020, but users began complaining about a bug that could …

Microsoft Announces SolarWinds Hackers Have Downloaded Its Source Code

The hackers who used SolarWinds software to conduct a cyber attack against the U.S. federal supply chain in 2020 also gained access to Microsoft’s internal network. They used accounts to view repositories containing source code for Microsoft products, although they weren’t able to change any of this code. The software giant also reported the incident had little effect on the …

5 Tips to Make your Passwords More Secure

An organization’s infrastructure is only as secure as the passwords protecting it. Poor password practices make it easy for hackers to access sensitive information, which is especially damaging in the case of financial data. Strong, unique passwords are essential for any account, so most organizations have established guidelines for creating passwords. These guidelines should generally focus on making passwords easy …

DDoS Attacks Take over Computer to Mine Cryptocurrency

Countless people have become fascinated with the current values of cryptocurrencies, like Bitcoin. With popularity comes security vulnerability and hackers looking to take advantage of unsuspecting victims. …Log into your iPressGo account to read the full article.

4 Useful Features That Are New in Microsoft Edge

Microsoft released the newest version of its Chromium-based Edge web browser in January 2021. Learn about four useful features that Microsoft introduced in version 88 of Edge. …Log into your iPressGo account to read the full article.

The Recent Dell Vulnerability Might Affect You

CyberMDX, a healthcare information security provider, has discovered two critical vulnerabilities in Dell’s Wyse thin clients. Both flaws could allow attackers to execute malicious code remotely, resulting in them accessing files on the affected devices. CyberMDX reported these flaws to Dell in June 2020, which applies to all devices running ThinOS versions 8.6 and below. …Log into your iPressGo account …

MacOS Update Changes Data Collection Protocol

New Apple iOS 14 updates have committed to transmitting encrypted data when launching applications, also promises to stop retaining IP addresses tracking user activity. …Log into your iPressGo account to read the full article.