Despite the age of the OS, Windows 7 has enjoyed a surprisingly large and loyal user base. That changed suddenly when Microsoft finally pulled the plug on Windows 7 support. It couldn’t have come as a surprise to many people. […]
Security lapses can happen to any company, large or small. No one is immune. Not even Google. Recently, the company began sending out email notifications to some users explaining that a bug in their system caused their videos to be […]
Hackers will take any and every opportunity presented to them, even if it means hacking smart light bulbs. Recently, security researchers at Check Point discovered a bug in the Philips Hue smart bulb that makes it vulnerable. The bug is […]
There’s a new threat making the rounds called ‘Metamorfo’ that you should be aware of. The malware began its life as a banking trojan. This news is from researchers at Fortinet, who report that the malicious code has recently gotten […]
It’s easy to get caught up in the hype of popular movies. Hackers know this and are beginning to incorporate Oscar Nominated movies into their strategies. They’re using enticing images to bait unsuspecting users to install malware and lure them […]
Wyze is one of the many manufacturers of consumer-grade smart devices. They recently confirmed that user data belonging to nearly two and a half million of its customers was exposed. The root cause of the exposure was traced back to […]
If you’re not familiar with Landry’s, you’re probably familiar with at least some of the restaurants the company owns. The company recently issued a formal ‘Notification of Data Breach’ in which they disclosed that an unauthorized user was detected on […]
Scammers have breathed new life into an old scam. For years, the old ‘Law Enforcement Lock’ trick has been used to cheat unsuspecting victims of their hard-earned money. The new wrinkle works like this: Scammers will redirect users using the […]
Researchers at Trustwave have observed a notable increase in the use of .ISO files to deliver malware. Hackers have relied on poisoned disk image files for years to deliver malware to their targets. It makes sense in a Windows environment […]