A small but important feature was recently incorporated by the Windows 11 design team. A new Account Lockout Policy enabled by default has been added. This policy automatically locks user accounts (including Admin accounts) after ten failed sign-in attempts. The […]
There’s a new threat to be aware of if you own an android device. Microsoft recently warned that their researchers had spotted a new toll fraud malware strain wreaking havoc in the Android ecosystem. Toll fraud is a form of […]
Researchers at Defiant authored the popular Wordfence security solution for WordPress users and they have detected a massive campaign that has seen hackers actively scanning for websites employing the Kaswara Modern WPBakery Page Builder plugin. The plugin was recently abandoned […]
If you eat out or are in the habit of ordering take-out on a regular basis, be aware. Recently, a large, well-organized web-skimming campaign has been uncovered that allowed hackers to swipe the payment card details for more than 300 […]
According to ongoing research by Group-IB, a massive phishing campaign is currently underway. This is a campaign that has impacted no less than 130 organizations across a broad range of industries. These include but are not limited to professional recruiting […]
Do you make use of the “MyChart” portal to refill prescriptions, contact your healthcare providers or make appointments? If so, you should know that recently, the healthcare giant Novant disclosed a data breach that impacted more than 1.3 million patients. […]
Using different passwords on every website and storing them in a secure password manager is a standard best practice in data security. It’s generally good advice, but what happens when the makers of password vaults get hacked? That’s what the […]
Do you have the Kali Linux distribution running on one of the machines you own? If you’re not sure what that is, then you almost certainly don’t. Kali is a Linux distro used mostly by “ethical hackers” who use it […]
MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system. Unfortunately, no system is bullet proof. There’s a way that a determined attacker could bypass sandbox restrictions and […]