Russian hackers target Mac OS X users

Fancy Bear, also known as APT28, is the Russian cybercriminal group responsible for hacking the Democratic National Party last year. Since then, the group has developed a host of tools to exploit Linux, Android, and Windows vulnerabilities. Last month, they spread a new strain of malware that specifically targets Apple Macbooks.

New smart search engine for G Suite users

Google Cloud Search is the latest tool launched for business customers that allow users to search across their G Suite products including Drive, Gmail, Sites, Calendar, Docs, Contacts and more. It was previously available in a limited preview, named Springboard, and was described as something similar to Google Now for enterprise workers.

Real-world audits: disaster recovery plans

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways.

Attacks on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running a WordPress website.

How to test out Android Instant Apps

At its I/O 2016 conference, Google introduced us to Android Instant Apps. This built-in feature allows users to access a cloud version of an app without having to download it from the Google Play Store. While the technology isn’t yet available to the general public, Google is running a limited test of the technology for a few devices.

Virtualization troubles: 3 common pitfalls

Although data storage is only one of the many ways to benefit from virtualized hardware, it’s still the most common use of the technology. Despite this popularity, virtualized storage is susceptible to a number of mismanagement catastrophes. We’ve outlined the three most common mistakes when utilizing this technology, right here.