marko-blazevic-rMCwWG2kSyU-unsplash

Microsoft to Acquire Activision Blizzard for 68.7 Billion

Microsoft has plans to acquire Activision for $68.7 billion, which will include franchises like Overwatch, Diablo, Call of Duty, World of Warcraft, and CandyCrush. All favorites from the Activision, Blizzard and King studios. Microsoft says it will be the “third-largest gaming company by revenue” once the deal closes. The company has stated plans to add

Read More »

Internet Explorer Bug Threatens Windows Users.

Almost four years after its younger sibling, Microsoft Edge, was born, security researchers keep finding troublesome security bugs in Internet Explorer. The most recent bug found is a proof of concept published by John Page (aka hyp3rlinx), a security researcher. The flaw takes advantage of a weakness in the way the browser deals with MHTML

Read More »

Zero-Day Vulnerability affects Chrome and Windows 7

Security analysts at Google and Microsoft have watched assailants utilizing a mix of a fixed Chrome weakness and an unpatched Windows 7 vulnerability. The declaration of the issue comes as a major aspect of their vulnerability disclosure policy. Both the Windows bug and Chrome bug deal with accessing memory that should not be accessed by

Read More »

Windows provides what Intel cannot

Big news hits the computer, updates sent out recently for Windows 10 are solving big problems caused by Intel’s patch. Back on January 2nd, there was an announcement that Intel CPUs were having some serious problems in regards to its security vulnerabilities and that these issues stemmed from features of the CPU that was essential

Read More »

OnePlus Update

OnePlus has been under some heat lately for their non-consensual data snooping through their mobile devices. After a security researcher had exposed OnePlus for their snooping, they have reportedly admitted to the non-consensual action. Their address to their customer service forum on Friday the 13th confirmed such accusations. OnePlus tried to clarify and explain that

Read More »

WPA2 protocol leaves all access points vulnerable! Including yours!

Recently, some online researchers have discovered a fatal flaw in the WPA2 protocol. This flaw can affect anyone and everyone that is involved with Wi-Fi access. This flaw allows potential attackers to manipulate vulnerable information such as passwords, e-mails, and other encrypted data, whilst intercepting that information they may also leave ransomware or other malicious

Read More »

What is Cloud technololgy?

Most often, when someone mentions the ‘cloud’, there is often someone who is too embarrassed to ask ‘what’ the cloud is. Cloud technology has taken the world by storm (no pun intended) in most all areas these days, the cloud is involved in the information storage/management. Businesses to college campus’ to home networks. So what

Read More »