Blog

Is Your Firefox Extension Leaving You Open To Attack?

Browser extensions are in the news lately, and not just for Firefox. Recently, hackers have corrupted several Google Chrome extensions, and are using them to display unwanted ads to unsuspecting users. For ...

Would Your Employees Sell Company Passwords For Less Than $1000?

Your employees are your biggest, most important, most valuable asset. Everybody who knows anything about business understand that. Unfortunately, your biggest asset is also your biggest liability, at least when it comes ...

Email Subject Line Might Help Indicate Potential Hack

Recently, internet security companies have been reporting increasing incidents of large numbers of emails being sent out with strange and distinctive subject lines. Typically they’re crafted as file names, and have image ...

CNBC May Have Your Password and Shared It

Recently, CNBC ran an article on password security. Embedded in the article was a tool they invited readers to use to test the strength and integrity of their passwords. The tool was ...

New USB Thief Trojan is Virtually Undetectable

There’s a new threat lurking just beyond the periphery of your network. It’s called USB Thief, and while it doesn’t quite measure up to the most sophisticated attacks currently making the rounds, ...

Gmail Gets Better With Possible Threat Notifications

It seems that Google never stops innovating and striving to improve the services it offers. Gmail, for instance, recently got some impressive upgrades that build on those rolled out previously, which aims ...

New Malware Can Hijack Your iPhone

There’s another new attack vector to beware of if you own an iPhone. This new attack, called AceDeceiver MITM is quite possibly the most convoluted attack the hackers have come up with ...

Smartphone Sales on the Decline For First Time

It seems that the era of explosive smartphone growth has come to an end. This fact will not surprise most of the people who watch the industry closely, and after all, it ...

iPhone Hit with New Exploit

There’s another new attack vector to beware of if you own an iPhone. This new attack, called AceDeceiver MITM is quite possibly the most convoluted attack the hackers have come up with ...

Microsoft Upgrade Deadline Extended But Don’t Wait Too Long

Microsoft really wants everyone who uses their OS to upgrade to Windows 10. In fact, this desire is so strong, that they’ve taken a remarkable step. Going forward, all new chipsets produced ...

Contact

Progressive Computing