Hackers found a new way to slip malware past your defenses. Researchers around the world have spotted a curious new campaign designed to scare victims by sending them emails warning of copyright infringement. The email begins by warning that the […]
Conflict in the workplace is sadly inevitable. Put a group of people in a room together for eight hours or longer every day, week after week. No matter how well they get along, sooner or later, it’s going to happen. […]
Are you a member of the Windows 11 Insiders group? If so, then you already know that you get a sneak peek at all the cool new features the engineers at Microsoft are building into the new Operating System. If […]
Do the meetings you hold tend run off the rails? Do you find that they frequently run far longer than you intended and that very little actually comes out of them? If those things are true and if you’re looking […]
Do you run a WordPress site? Do you also use the popular forms design and management plugin called NinjaForms? If you answered yes to both of those questions, be aware that NinjaForms was recently found to have a critical security […]
While “vishing” is by no means a new threat, it’s not something that has ever happened with sufficient frequency to get most people’s attention. So, if you haven’t heard the term before, you’re not alone. “Vishing” is short for voicemail […]
Data security isn’t something that’s at the forefront of most people’s minds, but it probably should be. These days, we use far more than just our trusty laptops and desktops to do real, meaningful work. Most people have a plethora […]
Do you have an account with Michigan-based Flagstar Bank? As one of the largest banks in the United States, it’s quite possible that you do. If so, be aware that the company recently issued a breach disclosure notification relating to […]
Recently, Microsoft published a fascinating blog post. In the blog post, they said they were experimenting with “novel approaches” when it comes to harnessing the power of AI to spot threats on the threat landscape before they become a problem. […]