Do you own and operate a WordPress website? Do you also use the “All in One” SEO plugin? If you answered yes to both of those questions, then be aware that you’ll want to update that plugin as soon as […]
Are you a GoDaddy customer? Do you maintain a WordPress blog with the company? If so be advised that the company recently announced a breach of their network. An as yet unidentified third party accessed GoDaddy’s Managed WordPress hosting environment. […]
Are you a OneDrive user running Windows 7, Windows 8, or Windows 8.1? If so be aware that on January 1st, 2022 your OneDrive desktop application will reach end of support. The company offered the following by way of explanation: […]
Phishing attacks tend to focus on executive level targets. They focus on high ranking targets who have considerable system access. That appears to be changing. A recent trend tracked by researchers from Avanan has revealed that nearly half of all […]
Hackers around the world are flexing their muscles. For reasons that aren’t yet clear they have been launching distributed denial of service (DDOS) attacks against Voice over Internet Protocol (VoIP) providers and it is leading to widespread voice outages. VoIP […]
A new study recently published by the digital identity firm Beyond Identity contains a number of surprises relating to passwords and password security. This is information that IT professionals and small or medium-sized business owners should be aware of. While […]
Since the start of the Covid-19 pandemic online dating sites have seen a tremendous surge in memberships. People are seeking romance online since in person dating was sharply curtailed by lock downs. Naturally this proved to be an irresistible lure […]
A new strain of malware which has been dubbed ‘Capoae’ has been spotted in the wild. It was written in Go and this strain targets Linux systems and WordPress installations. It was discovered by Larry Cashdollar. Larry is a senior […]
Apple released a very important security update today. The update fixes a pair of zero-day vulnerabilities that have been spotted in use in the wild to attack both Macs and iPhones. One of the two has been used to install […]