Hackers Offering Fake Free Kindle Ebooks To Hack Amazon Accounts

Do you own an Amazon Kindle? Amazon has a warning for you if you do. Beware. Hackers are now using poisoned ebooks to delete the contents of infected Kindle readers and take control of a victim’s Amazon account. The hackers take advantage of the fact that on any given day there are literally hundreds of […]

Hackers Offering Fake Free Kindle Ebooks To Hack Amazon Accounts

Do you own an Amazon Kindle? Amazon has a warning for you if you do. Beware. Hackers are now using poisoned ebooks to delete the contents of infected Kindle readers and take control of a victim’s Amazon account. The hackers take advantage of the fact that on any given day there are literally hundreds of […]

New Stalkerware Tracks The Location Of Its Victims

A startling revelation was made at the recent Black Hat cybersecurity conference in Las Vegas, Nevada. The ongoing pandemic has given rise to a new threat named Stalkerware. It is defined as apps (both malicious and mundane) that are being used increasingly to coerce and control individuals. Stalkerware is used mostly by one intimate partner […]

New Stalkerware Tracks The Location Of Its Victims

A startling revelation was made at the recent Black Hat cybersecurity conference in Las Vegas, Nevada. The ongoing pandemic has given rise to a new threat named Stalkerware. It is defined as apps (both malicious and mundane) that are being used increasingly to coerce and control individuals. Stalkerware is used mostly by one intimate partner […]

Older Industrial Technology May Have Security Risks

The vulnerability of Industrial Control Systems has been getting a lot of press in recent months. That’s a good thing because most people don’t spend much time thinking or worrying about such systems. Unfortunately they are among the most vulnerable systems of all. Industrial Control Systems haven’t really changed all that much in the past […]

Older Industrial Technology May Have Security Risks

The vulnerability of Industrial Control Systems has been getting a lot of press in recent months. That’s a good thing because most people don’t spend much time thinking or worrying about such systems. Unfortunately they are among the most vulnerable systems of all. Industrial Control Systems haven’t really changed all that much in the past […]

Windows Turned On Default Blocking For Potentially Unwanted Apps

Microsoft made a small but significant change to Windows 10 recently as it relates to PUAs (Potentially Unwanted Apps). It wasn’t something that got a lot of press but it’s a change well worth knowing about. Beginning with the May 2020 update for Windows 10, 2004, the Redmond Giant added a PUA blocking feature to […]

Google May Phase Out Secure Lock Icon For Websites

Google has had a long history of taking steps to make the web more secure for everyone. One of their early moves involved warning users via popup box when they surfed their way to a site that did not use the secure socket (HTTPS) protocol. This warning was good for users but didn’t do anything […]

Google May Phase Out Secure Lock Icon For Websites

Google has had a long history of taking steps to make the web more secure for everyone. One of their early moves involved warning users via popup box when they surfed their way to a site that did not use the secure socket (HTTPS) protocol. This warning was good for users but didn’t do anything […]

This Malware Can Take Control Of Facebook Accounts

Do you have a Facebook account? Even if it has been a while since you last logged on there is a new threat you should be aware of. A new strain of malware called FlyTrap was used recently to take control of thousands of Facebook accounts. Yours could be next if it hasn’t been compromised […]