Selling network access is big business on underground hacking websites. Even worse, the business is growing at an alarming rate, according to a report recently published by cyber security firm KELA. According to their report, the number of ads found […]
Since Google introduced Google Analytics back in 2005, it has become the industry standard. A simple, free method of getting a bird’s eye view into who’s searching for what on the internet. Millions of business owners around the world rely […]
The year 2020 could well be described as the Year of Ransomware. Security researchers around the globe who monitor such things have noted a sharp uptick in the use of ransomware this year, with well known threats like REvil, Ryuk, […]
Are you an Office 365 user? If so, be aware that Microsoft is adding some powerful new protections to the software suite, designed to make you safer. Hackers commonly target Office 365 users with a type of attack known as […]
What do you primarily use your PC for? It’s a more important question than you might think, because different use cases for your PC require it to be configured in different ways to optimize your user experience. Until now, that’s […]
Do you own a newer HP laptop? If so, do you make use of the HP Battery Health Manager? If you don’t know what that is, then the answer to the second question is probably no, but you’re about to […]
Hackers are relentless when it comes to testing the boundaries of software for potential weaknesses to exploit. It seems that an unknown group of hackers has found a new one. Based on what researchers at Malwarebytes are seeing, a group […]
Security researchers at Netlab have recently reported on their discovery of a terrifying new botnet on the web. Dubbed HEH, this botnet is a different sort of threat. Unlike most others, this one is not designed to launch DDOS attacks […]
If you’ve got an NVIDIA graphics card in your PC, and odds are pretty good that you do, be aware that the company recently released a security update. It patches a number of high severity vulnerabilities in the Windows GPU […]