Mac Malware Is Becoming A Bigger Threat For Users
In late 2020 a new strain of malware called UpdateAgent appeared and began infecting Mac users. Initially the strain wasn't all that worrisome. It stole system information but it was […]
In late 2020 a new strain of malware called UpdateAgent appeared and began infecting Mac users. Initially the strain wasn't all that worrisome. It stole system information but it was […]
Back in September of 2020 Microsoft announced that it was experimenting with the addition of SMTP MTA Strict Transport Security (MTA-STS) support to Exchange Online. This was done in a […]
BRATA malware was first spotted in the wilds by Kaspersky back in 2019. Its earliest incarnation saw it targeting e-banking users and it was designed to steal banking and login […]
If you have Google Drive, there's good news. The company has recently announced that soon they'll be rolling out a new feature to help alert users to the presence of […]
Hackers have recently hit upon a new money-making scheme. Some groups have started breaking into Instagram accounts belonging to people with high numbers of followers. They are then holding those […]
Google partner Zimperium zLabs has recently discovered a sophisticated scam targeting more than 100 million Android users. The scam has been in operation right under Google's nose for nearly two […]
There's good news for Apple users. The company has been busy and has recently released security updates that address two Zero-Day vulnerabilities. These are security flaws that could be exploited […]
One of the most persistently frustrating aspects of our highly interconnected world is that we seem to exist in at least three different distinct ecosystems. Apple users live in the […]
There is a new phishing campaign to keep a watchful eye on according to email security firm INKY. It's a particularly fiendish one. The attackers have designed an email template […]
Cisco recently discovered a critical security flaw in their Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS. The vulnerability allowed an attacker to execute code arbitrarily and gain root-level access […]