Unlike driver updates, BIOS releases typically arrive far less often—usually when vendors add support for new CPUs, but also occasionally to improve stability and performance, or to address security vulnerabilities. Regarding the latter, HP is pushing out firmware updates for over 200 laptops and desktops to patch a... Read more...
When you fill out an online form and hit the submit button, you're willingly transmitting your personal data to the website and any third parties you may have agreed to in the fine print. That's fair game. However, an alarming security report suggests your data is sometimes transmitted even if you change your mind and... Read more...
Another day another malware threat. Yes, yet another new way of delivering malware has shown up recently. That new way does not directly involve files but Windows Event Logs. According to security researchers at Kaspersky, a customer showed this new behavior. The method injects shellcode payloads into the event... Read more...
When you are investigating a crime, one of the most important things to establish is "motive." If you know a crime has been committed, having an understanding of why it happened is a critical step to figuring out who did it. In the strictest sense, installing software on someone else's computer isn't a crime. It's... Read more...
Admit it, you use the same password for multiple sites. Even if you don't, a lot of people do because it's just too darn difficult to juggle separate login credentials for a multitude of services and websites that you use or visit on a regular basis. Maybe you employ a password manager to keep track of everything, or... Read more...
Last week, Google introduced its new data safety section for the Play Store, which states that Android application developers have until July 20th to fully disclose their data collection, sharing, and safety practices. A new analysis of popular Android apps shows why this kind of data collection transparency is... Read more...
Windows Updates are a great idea, most of the time. Other times they're an annoyance, like when they download and install in the background while you're trying to play a system-intensive game. Or, they are just outright broken for some people. The latter of those seems to be the case for some Windows 11 users... Read more...
We’ve recently covered a number of sophisticated phishing scam techniques, including fake animated windows designed to steal passwords and automated call bots that trick victims into giving away multi-factor authentication codes. While ransomware attacks are currently on track to surpass phishing attacks as the number... Read more...
AV Comparatives has posted the results of its latest performance impact test of over a dozen popular antivirus programs, and unfortunately for Microsoft, its Defender program that's built into Windows only narrowly avoided coming in dead last. On the bright side, though, Defender moved up from taking the last spot in... Read more...
Another day another vulnerability. Several, actually—the Stable Channel for the desktop edition of Chrome had an update on April 26, 2022 that includes no less than 30 security fixes, half a dozen of which are rated as "High" severity flaws. The release notes for Google's Chrome v101.0.4951.41 for Windows, Mac, and... Read more...
Have you ever Googled yourself and stumbled upon some less than savory information or simply something you wouldn't want to be easily found? As Google states, it's important to control how people can find your sensitive, personally identifiable information (PII), so now you can. Using a new Google tool, users can... Read more...
Microsoft will be retiring Internet Explorer once and for all on June 15. However, Microsoft won’t be out of the web browser game with this retirement. The company has shifted its focus to maintaining and developing the Chromium-based Edge browser. Microsoft rolls out new Edge features fairly often, though some of... Read more...
Microsoft's Windows has plenty of reason to be proud of its status as the desktop operating system of choice for personal computers, but Linux drives a massive portion of the processing that lies beneath the surface of the internet at large. Ultimately, it's to everyone's benefit if security holes are closed, so we... Read more...
Back in May of 2021, Google announced that privacy labels would be coming to the Google Play Store. Now, almost a year later, the company has announced that it will soon be rolling these labels out to the Play Store with requirements for application developers. The Google Play Store already features an expandable... Read more...
When Coca-Cola started its “Share A Coke” campaign in the early 2010s, it was certainly not thinking of this. A ransomware group dubbed “Stormous” has reportedly stolen 161GB of data from Coca-Cola. The data is currently for sale on the dark web, although Coca-Cola has not confirmed the breach. The data includes... Read more...
We'll come clean up front: it's true that these security exploits require local access, and due to that fact, the urgent need to update might be a bit overstated. In this case, though, the excitement is less about the breadth of the vulnerabilities and instead the severity. If you're confused, Lenovo published a... Read more...
As we have alluded to in numerous recent posts, security and malware-related alerts are almost weekly if not more frequent. According to Google's Project Zero, a whopping 58 zero day exploits were found in 2021. That's basically about 1.12 new zero day exploits a week. Project Zero is an initiative from Google... Read more...
Back in January, we covered a phishing report by Check Point that placed DHL as the number one most-imitated brand in phishing attacks for the fourth quarter of 2021. DHL spoofs, representing 23% of global phishing attacks, passed Microsoft spoofs, which sat at 20%. However, Check Point just released its phishing... Read more...
There has been an ever-increasing number of vulnerabilities and malware rearing their ugly heads lately. One of the most common things these malware will attempt to do is gain elevated permissions to allow execution of its code without user interaction. Recently, a new vulnerability was found in the popular archival... Read more...
When Microsoft added Windows Subsystem for Linux it was exciting for developers, but it also raised a question. "If Windows can run Linux, when will it run Android?" A logical inquiry of course, because Android is a Linux-based operating system. Unfortunately, now that Android Subsystem has been added, a bad egg has... Read more...
Google is pushing out an emergency patch for its Chrome browser on multiple platforms, including Windows, Linux, and Mac to protect against a zero-day vulnerability that is being actively exploited in the wild. Applying the patch updates the browser to version 100.0.4896.127, and more importantly it protects users... Read more...
Cybercriminals are constantly on the hunt for vulnerabilities to exploit, and over the past six months it seems they've been ramping up their efforts to find weaknesses within Apple's ecosystem. According to a recent security report, the discovery of Apple device vulnerabilities surged a rather shocking 467% from the... Read more...
First ... Prev 13 14 15 16 17 Next