Android Devices Using Qualcomm Chips Can Be Hacked

Do you have an Android device? Is it built around a Qualcomm chipset? If so, be advised that you may be at risk. According to a report recently published by security firm CheckPoint, a recently discovered flaw could allow hackers to steal a variety of sensitive information on your phone or tablet. The vulnerability resides […]
Public Chargers Can Expose Your Device To Hacking And Malware

On paper, it seems like a lovely idea to use a public charger. Airports, hotels, and other high traffic areas have begun to increasingly offer public USB power charging stations to give people a convenient means of recharging their favorite devices. Unfortunately, things are not working out quite according to plan. Naturally, hackers around the […]
Hackers Are Imitating Government Agencies To Spread Malware

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian Revenue Agency, the German Federal Ministry of Finance, and the United States Postal Service. This is all part of a malicious campaign designed […]
Discord Users Be Careful Of Malware And Information Theft

Do you use the Discord chat service? If so, be advised that malware developers have been using the service to not only host various types of malware, but also to use it as a command and control server. In addition, they are abusing the chat client to force it to perform a variety of malicious […]
Some iOS Apps Found To Have Clicker Trojan Malware

Recently, a survey of Apple’s App Store by Wandera Threat Lab discovered more than a dozen iOS apps that have been infected with the ‘Clicker’ Trojan malware. As malware goes, this variant isn’t especially dangerous to those who wind up infected with it, but it’s still problematic. A spokesman for Wandera had this to say […]
New Server Data Breach Reported at NordVPN

NordVPN provides a popular Virtual Private Network (VPN) service used by clients around the world. Unfortunately, they recently disclosed that a server in one of their data centers was breached back in March of 2018. According to the details released, the server was located in a data center in Finland. It was compromised due to […]
Backdoor Could Be Used On Microsoft SQL Without Detection

If you haven’t heard of Skip-2.0 yet, prepare to be dismayed. Security researchers have recently discovered an undocumented (until now) backdoor designed for Microsoft SQL servers. It will allow a hacker working remotely to stealthily take control of a previously compromised system. Worse, this is not theory or conjecture. Researchers have found malware strains in […]
Are Hackers Using Popular Assistant Devices To Listen To Users?

The utility of virtual assistants like Amazon’s Alexa and Google Home are undeniable. They’re just genuinely handy devices to have around. Unfortunately, they’re also prone to abuse and exploits by hackers and unsavory developers. They can be used to spy on and even steal sensitive information from unsuspecting users. This is not new in and […]
Windows 10 Will Get Android Phone Call Integration Features

Microsoft may have given up on the idea of putting their Windows operating system on smartphones, but that doesn’t mean they’ve given up on smartphones altogether. Recently, the company announced a significant feature addition that will allow users to take calls made to an Android phone from their Windows-based PC. The new feature is currently […]
Tamper Protection Enabled By Default In Windows 10 Update

Do you have the new Windows 10? If you’re not sure, the most recent version (as of the time this article was written) is version 1903, which was the May 2019 update. Assuming you’ve got that version or later, you should have Microsoft’s Tamper Protection enabled by default. If you’re not sure what the big […]