(604) 200-2234

Return of the smartphone attack

Due to the recent WannaCry ransomware exploits, business owners are refocusing their efforts on protecting computer networks. Despite that, many leave one key device unaccounted for: their smartphone. The truth is hackers can exploit the technology in your smartphone to conduct malicious acts, and one of the most common is Bluetooth technology. Google paid a […]

Linux bug threatens Android users

Despite great efforts to prevent broken hearts and to enhance mobile security, there’ll always be the one that gets away. It’s not uncommon for us to overlook things small in size; we rationalize this by assuring ourselves that no substantial harm can come from things so tiny. But with mobile security it’s the little guys […]

Loading...