Helping Mom & Dad: Online Doctor Visits and Telemedicine
Whether it’s for routine care, a prescription refill, or a simple follow-up, online doctor visits offer tremendous benefits in terms of both convenience and ease of care—all good reasons to help mom and dad get connected with it. There’s no doubt that more older adults than ever are taking advantage of online doctor visits, more […] more…The IRS “Dirty Dozen” – Top Tax Season Scams to Steer Clear of This Year
Who loves tax season besides accountants? Scammers. Emotions can run high during tax time. Even if you’re pretty sure you did everything right, you may still have a few doubts kicking around. Did I file correctly? Did I claim the right deductions? Will I get audited? As it turns out, these are the very same […] more…Helping Mom & Dad: Online Banking
Editor’s Note: This is the first in a series of articles about how we can help our elder parents get the most out of digital life—the ways we can help them look after their finances and health online, along with how they can use the internet to keep connected with friends and family, all safely […] more…The Wearable Future Is Hackable. Here’s What You Need To Know
Quick mental math challenge: How many Apple Watches can you buy with $118 billion dollars? If you guessed around 296 million watches congrats, you’re smarter than the writer of this blog! We had to use a calculator. The point is that’s the predicted size of the US wearable market by 2028 according to a recent […] more…Trello introduces Dashcards to boost portfolio work tracking
Trello today unveiled several new features to its platform designed to help users better track and prioritize their work. The move comes a year after the work management tool overhauled its platform and introduced Trello views, which allow users to manage their work beyond the standard board format. Trello today said it’s extending the reach of views […] more…For Apple Car, a Chargepoint buy makes more sense than Peloton
Apple’s biggest challenge putting a vehicle on the road may not be the design, probably isn’t the artificial intelligence, and might not be the software and manufacturing – but almost certainly is the most mundane challenge of all: the lack of charging points. Apple Cars need chargepoints, too In the US, Apple’s home turf and […] more…Spam and phishing in 2021
Figures of the year In 2021: 56% of e-mails were spam 77% of spam was sent from Russia with another 14.12% from Germany Our Mail Anti-Virus blocked 148 173 261 malicious attachments sent in e-mails The most common malware family found in attachments were Agensla Trojans Our Anti-Phishing system blocked 253 365 212 phishing links Safe Messaging blocked 341 954 […] more…Nvidia drops plans to buy Arm for $40B
Graphics chipmaker Nvidia has announced it’s dropping plans to buy chip designer Arm from SoftBank Group Corp. for $40 billion after regulators pushed back over antitrust concerns. In a joint statement issued today, US-based Nvidia and Japan-based Softbank said they terminated the agreement they’d been working on since September 2020 because of “significant regulatory challenges.” […] more…Google Workspace sees Essentials Starter as a way to ‘democratize’ collaboration
The launch last week of Google Workspace Essentials Starter Edition aims to offer business users a no-cost solution designed to enhance teamwork and innovation with secure-by-design collaboration. Google said Essentials Starter was designed to help employees and their teams break down silos and work together in new ways, even if their organization relies on legacy productivity […] more…Roaming Mantis reaches Europe
Roaming Mantis is a malicious campaign that targets Android devices and spreads mobile malware via smishing. We have been tracking Roaming Mantis since 2018, and published five blog posts about this campaign: Roaming Mantis uses DNS hijacking to infect Android smartphones Roaming Mantis dabbles in mining and phishing multilingually Roaming Mantis, part III Roaming Mantis, […] more…Target Open Sources Web Skimmer Detection Tool
Retail giant Target this week announced the open source availability of an internal tool designed for the detection of web skimming attacks. read more more…Critical Flaw Impacts WordPress Plugin With 1 Million Installations
Over one million WordPress websites might have been impacted by a critical vulnerability in the Essential Addons for Elementor plugin. Essential Addons for Elementor provides WordPress site admins with more than 80 elements and extensions to help them easily design WordPress pages and posts. read more more…Rights Group Says Lebanese Staffer Targeted With NSO Spyware
Human Rights Watch said Wednesday that one of its senior staff members was targeted last year with spyware designed by the Israeli hacker-for hire company NSO Group. read more more…New Open Source Tool Helps Identify EtherNet/IP Stacks for ICS Research, Analysis
Industrial cybersecurity firm Claroty on Wednesday announced a new open source tool designed for identifying EtherNet/IP stacks. According to the company, the new “EtherNet/IP & CIP Stack Detector” tool can be useful to security researchers, operational technology (OT) engineers, and asset owners. read more more…New macOS Malware ‘DazzleSpy’ Used in Hong Kong Attacks
A recent campaign targeting individuals in Hong Kong has leveraged at least two pieces of malware designed to target macOS systems. read more more…Revelstoke Emerges From Stealth With SOAR Platform
California-based Revelstoke on Tuesday emerged from stealth mode with a security orchestration, automation and response (SOAR) platform designed to help organizations customize and automate their security operations center (SOC). read more more…More information
- Microsoft Internet Explorer and Edge CVE-2016-7196 Remote Memory Corruption Vulnerability
- Apple restricts adblocking extensions
- Indian draft rules on encryption could compromise privacy, security
- Oracle Server Vulnerability Exploited to Deliver Double Monero Miner Payloads
- Creepy Facebook apps mine your profile for bikini shots, break-up status
- Botnet Targets Critical Vulnerability in Grandstream Appliance
- Black Hat 2019: Q&A with McAfee
- One in three organizations suffered data breaches due to mobile devices
- Ransomware Group Leaks Data Allegedly Stolen From Kawasaki Motors
- Microsoft Windows Library Loading CVE-2015-6133 Remote Code Execution Vulnerability