Once again, this is not a surprising revelation. Criminals will focus on the most prevalent targets and there are certainly more Windows 10 and 8 machines in play. But regardless of the operating system, the entry point is most often the user of the operating system and not the code running in the background.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page