Blog Archive - Page 12 of 16 - WebINTENSIVE Software
archive,paged,post-type-archive,post-type-archive-blog,paged-12,post-type-paged-12,ajax_fade,page_not_loaded,,,qode-child-theme-ver-1.0.0,qode-theme-ver-6.5,wpb-js-composer js-comp-ver-4.4.3,vc_responsive


Java Flaws Require Action

Here we go again. Newly discovered flaws in Java are already being exploited by hackers, according to the U.S. Department of Homeland Security. While Java...

Read More

Social Sneakiness

South Carolina got hit, and hit hard. In the most damaging cyberattack ever launched against a state government, a hacker used stolen credentials to snatch...

Read More

Failover for Frankenstorms

Hurricane Sandy inflicted devastating human losses along the East Coast. The storm also created widespread disruptions of every aspect of infrastructure in the afflicted areas—including...

Read More

Twitter’s New Rules

Looming changes to Twitter's API policy are shifting the rules for social media integration and may affect how you leverage Twitter to draw users into...

Read More

Consumer Cloud Risks

Whether you know it or not, your employees are probably using consumer-oriented cloud services to store work-related files. Such practices could jeopardize the safety of...

Read More