Will We Control Computers With Our Brains Soon?

Over the years, Facebook has made several high-profile acquisitions, with one of their most recent being the acquisition of Oculus Rift for a staggering two billion dollars.  Now, rumors are swirling that ...

Vimeo Could Have Collected Biometric Data Without Consent

The popular video site Vimeo now finds itself in hot water and are facing a lawsuit for allegedly violating the Illinois Biometrics Information Privacy Act.  The act requires all private companies collecting ...

Wireless Everywhere and Everything — Access Points for PCs and Laptops

Summary: Wireless access points for PCs, laptops, and phones are discussed by Dave Hodgdon and Steve Ripper from PCG IT. Find out everything a company needs to know about access points and Wi-Fi connections. Listen or read more to learn about ...

Google Adds Several New Password Features To Help Users

Google is taking additional steps to provide a safer and more secure environment for their massive user base.  Chrome is the most widely used browser in the world. In recent months, Google ...

Hackers Now Can Access Data In Secure PDF Files

A team of six researchers from Ruhr-University Bouchum and Munster University, in Germany have discovered a critical flaw in the way that popular PDF viewers display data. This makes it possible for ...

Browser Update Warnings May Actually Be Malicious Hackers

Researchers at FireEye have recently unearthed a particularly nasty new campaign that is both multi-faceted and dangerous. At the heart of the attack are hacked websites which display seemingly innocuous popup message informing ...

Google Is Searching For Unauthorized Gambling Apps On Play Store

Google heavily regulates gambling and gaming apps on its Play Store.  It's not hard to understand why.  The industry has a long history of gouging and otherwise abusing the people who play ...

Documentation

Summary: Documentation is a time-consuming process, but an absolute necessity to ensure all IT functions and equipment is tracked. Hear from Dave Hodgdon and Lonnie Cherry of PCG IT on how and why to document. Listen or read more to find ...

New Exploit Discovered That Adds Malware To Advertisements

Hackers and scammers have a new tool in their toolbox, and they're making rapid use of it.  Recently, researchers from Confiant have discovered a new campaign involving a Chrome for iOS exploit. ...

DoorDash Leaks Personal Data Of Users And Drivers

Another week, another high-profile data breach. This time, DoorDash confirmed on a recent blog post that data on nearly five million of its users had been accessed by an unauthorized (and at ...