As you’re probably aware, recently a vast trove of Facebook profiles totaling 533 million in all, wound up on a hacker forum. The company was initially silent about the issue, but the company has now released a statement about the […]
Most businesses are getting better at guarding against malware attacks. We still hear about successful attacks far too often, but companies are undeniably getting better at defending against them. Unfortunately, the same cannot be said of firmware attacks, which are […]
If you had to guess, worldwide, how many phishing emails would you estimate are sent out every day, what would you say? If you guessed anything less than three billion, you’d be incorrect. Three billion a day, on average. That’s […]
It’s tax season once again! That, among other things, means that hackers and scammers are out in force, so beware! As in years past, the primary vehicle hackers and scammers use to run their various tax scams are phishing emails. […]
Taiwanese tech giant Acer is the latest company to fall victim to relentless hackers. What makes the Acer breach especially noteworthy is the fact that the group behind the attack is demanding a fifty-million-dollar ransom, which is the highest figure […]
If you don’t spend much time in the Apple ecosystem, you may not realize that Xcode is a completely legitimate tool used in macOS for developing a wide range of software and applications. Recently, based on research conducted by SentinelLabs, […]
A large US hacker collective claimed credit for something you may not have heard of yet called “#OperationPanopticon.” According to the group behind the attack, they compromised a high level administrator account at a Silicon Valley firm called Verkada, which […]
For the last month or so, Google has been testing the notion of using HTTPS as the default protocol for all URLs a user types into the address bar. Those who have been experimenting with Chrome’s latest Canary build have […]
Many industry insiders consider physical security keys used in the context of two-factor authentication login schemes to be the final word in digital security. That is because even if your password is compromised, if you’re using a physical piece of […]