Technology News, IT articles & Information | Tecbound Technology

Blog

Fake Work From Home Opportunities Are Phishing For Data

April 26, 2022

It's no secret that the pandemic changed the way much of the world works. Tens of millions of people are now working from home with millions more eyeing that as a very real possibility.

Don’t Let Your Employees Become Your Biggest Vulnerability

April 21, 2022

A few years ago, TechRepublic ran a story with the following headline: “Employees Are Almost As Dangerous To Business As Hackers And Cybercriminals.” From the perspective of the business, you might think that’s simply inaccurate.

Google Messages Users On Android Get New Features

April 19, 2022

Do you use Google Messages?  If so, there's good news!  In recent months, the company has taken steps to bridge the Windows and iOS ecosystems the Android ecosystems, and the iOS ecosystems.

Don’t Overlook Security When Offboarding Employees

April 12, 2022

“The Great Resignation” is impacting employers all over the world as employees make shifts in their lives and careers in the wake of the global pandemic.

This Malware Phishing Campaign Hijacks Email Conversations

April 07, 2022

Hackers have been using social engineering tricks to get their malicious code onto the systems of unsuspecting victims. This has been happening for almost as long as the internet has been around.

These Medical Devices Are Vulnerable To Security Threats

April 05, 2022

Thanks to the fine folks at Palo Alto Networks we have a better view of the relative safety and security of network-capable medical devices.  Unfortunately, the news is grim.

People Are Still Not Using Secure Passwords Despite Warnings

March 31, 2022

It's 2022 and after years of warning people repeatedly about the dangers of using the same old passwords and using the same password across multiple websites, you would think this would get better

New Malware Is Using CSV Files To Infect Users

March 29, 2022

Researchers have spotted a new phishing campaign you should be aware of. What sets this one apart is that the hackers are using a lowly but specially crafted CSV file to infect machines.

Free Guide

16 Questions You MUST Ask Before Hiring Any IT Company