What Is the Braktooth Bluetooth Bug and Are You At Risk?

If you've ever poked your nose into the world of cybersecurity, you'll know that hackers tend to find crippling flaws in well-established technologies, opening up an exploit for hundreds of thousands of devices worldwide. Such is the case of the BrakTooth exploit, which aims to cause problems for Bluetooth devices around the world. In this […]

Continue Reading

The Risk of Compromised Credentials and Insider Threats in the Workplace

Compromised credentials and insider threats are a recipe for disaster when it comes to viable data security. The lack of resources, a rapid shift from traditional infrastructures to cloud-based models, and a huge influx of unmanageable IT accounts are all contributing to the growing data threats in the workplace of today. Let us now explore compromised […]

Continue Reading

Get Paid to Play Apps: How They Work and What You Risk

You’ve probably seen advertisements for apps that offer to pay you just for playing games on your phone. It sounds too good to be true, doesn’t it? Let’s take a look at how these Get Paid to Play (GPT-Play) apps really work and what you as a user stand to gain or lose by using them. How […]

Continue Reading