What is Proxmox?

In this article you’ll get an introduction to Proxmox, the powerful open-source virtualization platform, how it works, how it differs from other hypervisors such as VMware and Hyper-V and how Proxmox users can now benefit from Hornetsecurity VM Backup.  The post What...

What to Do if Your Data Gets Caught in a Breach

Data breaches have become alarmingly common in recent years – most every week, we read another headline about mass theft of personal information. No industry is immune. Underwear retail giant Victoria’s Secret had to shut down its website after a suspected ransomware...

The North Face Issues Customer Warning After April Credential Attack

Outdoor apparel brand The North Face notified its customers of a credential stuffing attack in April. The North Face April breach A credential stuffing attack compromised personal data on The North Face’s website in April. The US outdoor apparel retailer, owned by VF...

IBM MaaS360 new homepage

IBM MaaS360 introduces a redesigned homepage that enhances usability, boosts performance, and offers a more intuitive interface for users.

How to Remove a Hacker from your Phone in 7 Steps

our phone is probably the most personal device you own. So when something feels off, AKA your battery drains fast, apps crash, or you notice unfamiliar calls or texts you didn’t make, it could be a sign that a third-party app or malicious actor is hacking you. And...