Microsoft has been toppled from its position on at least one list, but it’s doubtful the company is too upset over it. International shipping service DHL took the No. 1 spot as most-imitated (spoofed) brand in phishing attacks for the fourth quarter of 2021.
In many phishing attacks, the attacker tries to fool the...Read more...
Linux used to be considered fairly safe from malware. Few, if any, threat actors targeted the Unix-based operating system. That’s changing rapidly, though, as reports indicate malware for Linux increased by 35 percent in 2021, compared to the previous year.
Linux is commonly used for Internet of Things (IoT) devices. With more people adopting Read more...
Quick! You're a multinational shipping conglomerate, what is something that stays in the forefront of your mind on the regular? Apparently, if you are FedEx then missile defense systems are exactly what's on your mind.
In what seems like a scene from an Austin Powers movie a recent proposal to the US Federal...Read more...
This really should go without saying, but for the benefit of anyone who needs reminding, be extra cautious about where you buy items online. That also means double and even triple checking the URL. The reason for the reminder is because Nintendo posted a warning saying it knows of at least one fake site actively...Read more...
End-to-end Encryption for most people this is something invisible they never even think about, but for just about everyone who uses messaging apps such as Facebook Messenger, WhatsApp, Signal and many others, this is an absolute necessity for privacy.
In a recent report by Rolling Stone it was revealed that the UK...Read more...
Some people may find this hard to believe, but the built-in antivirus protection in Windows is pretty good these days, and has been for quite some time. Defender routine passes musters by independent AV testing agencies. Unlike other AV solutions, though, it is exclusive to the Windows platform for consumers. Perhaps...Read more...
It seems as though antivirus software companies don't only want to secure your computers nowadays, but your crypto mining efforts on those PCs as well. Customers of two antivirus software products have the ability to opt-in to crypto mining on their protected PCs.
The world of cryptocurrency and NFTs has been...Read more...
The Raspberry Pi is terrific for plenty of uses, from retro-style gaming to running an extremely low-cost server. A team of researchers have discovered another new use for Raspberry Pi: hands-off malware detection.
While most virus and malware detection depends on file signatures and behaviors, this new project...Read more...
It is a good idea to always be wary of packages, especially if you are not expecting one. The United States Federal Bureau of Investigation (FBI) recently warned American companies that cybercriminals are sending USB drives with ransomware in the mail. The cybercriminals have attempted to mimic legitimate institutions...Read more...
In another example of social engineering’, an unpatchable bug has been discovered in iOS. This ultimate persistence bug makes you think your iPhone has been shut down when it hasn’t. Once in effect, it’s a trivial matter for nefarious individuals to activate your iPhone’s camera and microphone to spy on you.
The...Read more...
Many people have returned to work after a long holiday break only to discover that their messages are not sending, their computer is behaving slowly, and/or they are faced with a black screen. There is thankfully an end in sight. Microsoft recently issued patches for the “YSK22” Exchange mail and black screen...Read more...
Normally, New Year’s Day is a time to relax, reflect and recover from the previous night’s festivities, but for System Administrators this year, that is not the case. Reminiscent of the Y2K scare at the turn of the century, a new bug has appeared, causing Microsoft Exchange servers to fail and forcing admins to...Read more...
It's a good idea for big organizations to hire security researchers for help securing their systems. No matter how much effort you put into something (like securing your network), it can sometimes require a person looking at it from a different angle to point out a problem you couldn't see.
Given that lede and...Read more...
You may not be aware of this, faithful HotHardware reader, but ransomware attacks are rarely random. More commonly, it's an operator within a group who targets a specific organization or network looking for a hefty payout. One such group is the organization AvosLocker, who uses a tool by the same name to encrypt...Read more...
In the past, we have seen incidents of text messages being rerouted to steal two-factor authentication codes to breach peoples’ accounts. Now, criminal hackers are being more direct in potentially using SIM swap attacks by getting a carrier—in this case, T-Mobile—to switch a customer’s number to an attacker-controlled...Read more...
Do you let your browser store logins for websites like Twitter, Facebook, or HotHardware? Well, you probably shouldn't. Not only does it let anyone who gets on your PC access your personal information, but it also opens you up to easy attacks from "info-stealer" malware.
South Korean cyber-security firm Ahnlab just...Read more...
LastPass is telling its users that there is no evidence to suggest their passwords have been compromised, after previously sending out emails to some users stating their master passwords have been compromised. So what exactly is going on? According to LastPass, the email warnings were "likely triggered in...Read more...
Nobody wants to rack up bad karma, which should be reason alone not to pilfer movies from the internet via BitTorrent or whatever other means. But even disregarding the moral aspect or pirating movies and games, there's another reason not to engage in such behavior—you could end up with a malware infection. Some...Read more...
If you're reading this, you probably don't need to be told that a "bug bounty" is a cash prize paid to security researchers that find a software exploit. Non-USians might need to be told that "DHS" refers to the United States Department of Homeland Security. "Hack DHS" is the bug bounty program run by the agency, and...Read more...
You might already use DuckDuckGo as your go-to search engine rather than Google or Bing (or whatever else—AskJeeves, perhaps?). If you're into DuckDuckGo, then you will be ecstatic to learn that it is expanding from a privacy oriented search engine into a full-blown browser on the desktop, just as it has done on...Read more...
With data breaches and malware on the rise, millions are turning on two-factor authentication (2FA) to try and protect themselves from an attack. One of the most popular apps to use with 2FA, Google Authenticator, has just hit a very big milestone because of it.
People have been bombarded with headlines about...Read more...
In the spy thriller series Mission Impossible, Ethan Hunt’s directives from his superiors always self-destruct after being viewed. Information security isn’t just for spies, though. Many people face an uphill battle maintaining digital security, but the toughest challenge may be physical attack. You can only do so...Read more...