April 06, 2020
Just because you can does not mean you should. Think twice before making solutions more complex than they need to be Read more â¶
Zoom pauses new feature development to focus on privacy, security
FCC wants to add a new swath of bandwidth to Wi-Fi 6
C++ proposal dismisses backward compatibility
How to protect yourself from coronavirus phishing threats
Pandemic leads to surge in video conferencing app downloads
New coronavirus-era surveillance and biometric systems pose logistical, privacy problems
What is phishing? How this cyber attack works and how to prevent it
Does Your Security Program Secure Your Company and All Your Remote Workers? Read more â¶
'Zoom-bombing' has become an unwelcome phenomenon as the video conferencing vendor gains users now that work-from-home has become commonplace. Read more â¶
DEALPOST
This 17-hour web course, geared towards current IT pros, provides an easy way to train from anywhere. Read more â¶
If approved, a Federal Communications Commission proposal would add the 6GHz band to the unlicensed spectrum used by Wi-Fi 6, making room to support more devices from a single Wi-Fi access point. Read more â¶
Proposal to the C++ standards committee would give up backward and binary compatibility for safety and simplicity Read more â¶
The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and COVID-19 phishing attacks and five ways to avoid them. Read more â¶
As the COVID-19 outbreak continues to disrupt business, employees are turning to mobile business apps to ensure productivity remains high. Read more â¶
Governments and companies are using biometrics and geolocation to identify and track potential coronavirus victims in the name of public safety. Read more â¶
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack. Read more â¶
So what did ransomware in 2019 actually look like? Read on to learn about the biggest attacks of the year, how companies bounced back from them, and how you can stay protected in 2020. Read more â¶