Researchers at Bitdefender have discovered a new malware campaign. This one uses an attack method that has fallen out of favor in recent months, called the Exploit Kit. Exploit Kits used to be all the rage. Flash Player was a […]
A handy new Google Assistant is coming soon to a device near you. The new feature is designed to automate the frustrating and often time-consuming task of changing your passwords after a breach. This information is according to a tweet […]
A small but important change is coming to your Android apps. Soon you’ll notice a new Data Safety section on the Google Play Store which will provide greater transparency about exactly what data the apps you install are collecting. The […]
There’s a new hacking campaign underway that you need to be aware of especially if you or anyone you know is interested in upgrading to Windows 11. The campaign appears to be a legitimate offer from Microsoft and it gives […]
If you rely on a Microsoft Exchange server to handle email for your company, there is something you should be aware of. Recent research by security and analytics company Varonis has discovered that an affiliate of Hive ransomware has begun […]
Do you have an Android device? Is it built around a Qualcomm or MediaTek chipset? If you answered yes to both of those questions, be aware that researchers at Check Point have recently discovered an issue which could put your […]
Considered to be social media for professionals, LinkedIn is an invaluable tool for millions of people all over the world and a great way to make a wide range of professional connections. Unfortunately, hackers and scammers are aware of this […]
Millions of people around the world have leveraged the awesome power of WordPress to build their sites. Whether for personal or business use, WordPress has the flexibility and functionality to create just about any type of site you can dream […]
The owners of the Qbot botnet are changing things up. The botnet’s normal Modus Operandi for distributing their signature Qbot malware has been to push their malicious code via phishing emails which contain Microsoft Office documents laden with poisoned macros. […]