While malware and phishing are two different kinds of cyberattacks, threat actors sometimes use both methods in malicious campaigns. A threat actor known as Roaming Mantis appears to be doing exactly that in a new campaign documented by researchers at the cybersecurity firm SEKOIA. Roaming Mantis has previously... Read more...
There are millions of Android apps in Google Play, and while there are safeguards in place to keep malicious ones from sneaking in, a few bad apples inevitably creep through the door. When that happens, millions of devices can end up infected. A recent security report called attention to a handful of them that have... Read more...
There is a strong possibility that if you're reading this website, you are familiar with VLC Media Player. The popular application, which bundles important codecs along with the player rather than relying on the OS to provide them, is the video player of choice for millions of people who became tired of fussing with... Read more...
According to a recent cybersecurity report, ransomware attacks, having doubled in each of the past two years, are on track to outpace phishing attacks as the number one cause of data compromises. That said, phishing attacks are still king for now and will continue to pose a serious threat even if they are surpassed by... Read more...
Another day another security risk. This one happens to get deployed via iffy software deployed on the Microsoft Store. This particular issue is related to installing games via the Microsoft Store, with those games often being clones of legitimate titles, so it is really easy to make this mistake. Nicknamed Electron... Read more...
If you haven't been keeping up with Windows news, Windows 11 is really trying to be tough on security. As part of that push, one of its major requirements is that your system must have a Trusted Platform Module, or TPM. Historically speaking, that was a physical device on your motherboard that provided an immutable... Read more...
In the spy thriller series Mission Impossible, Ethan Hunt’s directives from his superiors always self-destruct after being viewed. Information security isn’t just for spies, though. Many people face an uphill battle maintaining digital security, but the toughest challenge may be physical attack. You can only do so... Read more...
As ransomware and cybercrime are constantly making the headlines these days in traditional electronic mediums, Zelle banking users are also finding themselves being targeted by scammers. Worse yet, in the wake of having funds stolen from bank accounts, victims are finding little to no help from their banking... Read more...
When it comes to the convergence of convenience and technology, Bluetooth is right up there with the advent of USB, which is why there are billions of devices that support the wireless standard. Frighteningly, they could all be at risk of more than a dozen vulnerabilities discovered by security researchers Matheus E... Read more...
When people are hit by malware, it typically ends with files being locked or some other terrible outcome for the end-user. However, researchers have now discovered a piece of malware that turns the tables on people who try to pirate content by blocking illegal websites. As it turns out, perhaps not all malware is... Read more...
With all due apologies for the disappointing news, you did not win a set of Apple AirPods, no matter what that unsolicited text message you received may have said. The text message is a scam attempt, plain and simple. It has gotten so big that the Better Business Bureau (BBB) felt it necessary to issue a warning to... Read more...
Don't blindly click that link or assume the notification about a system update that you received is real. Zero-day exploits in popular server applications like Solarwinds and Exchange may grab headlines, but the biggest problems most users face with tech security are of the socially-engineered variety. That's the case... Read more...
The SolarWinds breach has been pervasive, and the world is still reeling from the effects. We have heard that hackers accessed data from Microsoft, U.S Government agencies, and other high-profile companies. Now we're learning about the full scope of the data that was allegedly obtained. A website recently appeared... Read more...
We’ve seen ransomware in hospitals and schools, and it wreaks havoc no matter the case. This is especially true when people are relying on technology now more than ever due to the COVID-19 pandemic. The Baltimore County Public School district encountered this firsthand when malicious attackers installed ransomware... Read more...
These days just about everybody takes Bluetooth for granted. Manufacturers phase out useful physical ports like headset jacks in high end devices with the expectation that buyers will use Bluetooth headphones. Our cars, watches, locator tags, home theaters, and even game controllers rely on the ubiquitous short-range... Read more...
Ransomware is a global problem that can strike individual, organizations, and even health institutions to disastrous results. It demands that the user send money, typically in the form of cryptocurrency to the attackers to have their devices and files unlocked. An old ransomware threat called Black Rose Lucy that was... Read more...
Bicyclist Zachary McCoy found himself at the center of a police investigation thanks to his Android phone's location-tracking information. McCoy was riding his bicycle while using fitness tracking app RunTracker to record his rides. The man says that one Tuesday afternoon in January, he received an email from Google's... Read more...
It's all fun and games until a nasty bit of malware infiltrates your PC and wreaks havoc, right? To quote the late, great Bill Paxton, at that point it's "Game over man! Game over!" Fortunately, common sense computing habits are highly effective. Malware writers can be a clever, however, and security researchers are... Read more...
Enabling two-factor authentication (2FA) wherever possible is generally recommended—it helps keeps the hackers at bay, even if your password has been compromised. Better security is a reward in and of itself. Electronic Arts is taking things a step further, though, by gifting a free month of Origin Access who lock... Read more...
Microsoft is warning Windows users of several new "wormable" exploits similar in style to BlueKeep, two of which are tagged as critical Remote Code Execution (RCE) vulnerabilities. As with BlueKeep, which Microsoft patched a few months ago, the exploits exist within the Remote Desktop Services protocol (formerly known... Read more...
As has been warned in the past, if your company uses Box to share files and is employing a custom domain, you might be exposing confidential data. That is not because of a bug or vulnerability in Box. Instead, it's due to improperly configured settings that could allow a snoop to find your files. Security firm... Read more...
We have all heard of the dark web: a lawless digital world, uncharted and unstructured, full of data -- much of it illegally acquired and illegally for sale -- that cannot be viewed without special tools: proxy servers, TOR browsers, and the like. It's a murky and mysterious place, a place where much information... Read more...
1 2 3 Next