A recent deepfake scam has rocked the financial landscape of Hong Kong, demonstrating the extreme lengths to which cybercriminals are willing to go to defraud unsuspecting victims. This sophisticated scheme, which saw attackers coerce an employee into transferring a...
Content By Joe Beck
Will Apple Ditch the Lightning Port?
In a recent announcement, the European Union (EU) ruled that by 2024, Apple and other cell phone manufacturers must make cell phones to be “…equipped with the USB Type-C receptacle.” This begs the question: is this the end of the lightning port? Will Apple Switch to...
Workplace Security: Zero Trust Network Access vs. Virtual Private Network
Virtual Private Networks Virtual Private Networks (VPN) have been utilized by businesses since the early 2000s. They can be complex with auditing and levels of security, or extremely basic with little overhead. The simplest and most commonly used analogy for...
Developments in the AI and NFT Space Could Revolutionize Live Events
The field of technology is inundated with buzzwords – Augmented Reality, Artificial Intelligence, Net Neutrality, Blockchain – and while some of these are thrown around without much thought or direction, there are some promising developments in the AI and NFT space....
Apple Users, Beware: Apple Security Vulnerabilities
Vulnerabilities in software and hardware are as common as weather changes in Northeast Ohio, and they aren’t going away any time soon. A few years ago, Intel announced vulnerabilities in virtually every computer processor produced, and its largest competitor, AMD, has...
Apple’s Latest Software Update Includes New Privacy Features
Privacy is always a hot topic when it comes to news pertaining to technology, and Apple is continuing to influence that trend with some great new privacy features in iOS 15. This comes in contrast to the company’s proposed on-device photo scanning, which Apple...
Client Alert: Phone Update Needed To Patch Dangerous iPhone Exploit
(Video above from Reuters) A dangerous iPhone exploit has recently been discovered that allows an attacker to take control over any iPhone without the end user clicking on anything – simply by receiving a certain type of text message. Apple quickly released a security...