How to Quickly Remove Malware in 2022
If you’re like most people, you probably use your computer for most of your online activities. It’s amazing what the internet can do to make our lives easier. But if you’ve spent any time online, you know the internet also comes with some risks. Malware (or malicious software) is one risk of living a connected […] more…The Big Reason Why You Should Update Your Browser (and How to Do It)
The humble internet browser. Dutifully taking you the places you want to go online, whether that’s the bank, the store, the movies, or even to work. All the more reason to make sure your browser gets every last bit of protection it can. It’s easy to fire up your browser without a second thought. Arguably, […] more…Podcast: What’s next for the App Store?
This week, Apple said it paid developers $60 billion in 2021. That suggests that, last year, the App Store raked in more money than ever. Still, 2021 was not all roses for the App Store. In September, Apple’s lawsuit against Epic Games over in-app purchasing ended. While the judge ruled in favor of Apple most […] more…Spam and phishing in Q3 2021
Quarterly highlights Scamming championship: sports-related fraud This summer and early fall saw some major international sporting events. The delayed Euro 2020 soccer tournament was held in June and July, followed by the equally delayed Tokyo Olympics in August. Q3 2021 also featured several F1 Grand Prix races. There was no way that cybercriminals and profiteers could […] more…How to Spot Fake Login Pages
Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. Odds are, you landed on a phony version of a legitimate corporation’s website—a tried and true tactic relied on by many cybercriminals. Fake Login Pages Explained A fake login page is essentially a knock-off of […] more…Fraudulent Apps that Automatically Charge you Money Spotted in Google Play
Google’s Android operating system has been a boon for the average consumer. No other operating system has given so much freedom to developers and hardware manufacturers to make quality devices at reasonable prices. The number of Android phones in the world is astounding. That success comes with a price, however. A recent report from our own […] more…What’s in the latest Edge update? Password monitor and vertical tabs
Microsoft’s Edge 88, last week released, boasts major improvements to its password manager and debuted new tab features, including vertical tabs — something Chrome has yet to offer. The Redmond, Wash. company also patched at least 24 security vulnerabilities, the most serious marked as “High,” the second level in a four-step ranking system. Google’s Chrome 88, […] more…Apple’s COVID-19 response shines light on social responsibility
Consumers and investors are becoming increasingly ethical when it comes to the choices they make, they seek authenticity, corporate social responsibility. Apple’s values-driven approach resonates with this growing awareness, and it’s also reflected in the company’s own fundraising and volunteer efforts. Ethics as a business opportunity Enterprises are becoming increasingly aware of the evolution of […] more…Special Delivery: Criminals Posing as Amazon Are Out to Steal User’s Data
One of the joys of online shopping is instant gratification – your purchases arrive on your doorstep in just a few days! Unfortunately, consumers aren’t the only ones taking advantage of this convenience – hackers are also using it to trick users into handing over money or data. Recently, AARP recounted several scams where cybercriminals posed as Amazon’s customer […] more…Online Banking—Simple Steps to Protect Yourself from Bank Fraud
Online Banking—Simple Steps to Protect Yourself from Bank Fraud Even if you’re not big on online banking, online banking is big on you. Online banking is well on its way to becoming a cornerstone of the banking experience overall. More and more transactions occur over the internet rather than at a teller’s window, and nearly […] more…Internet Safety Begins with All of Us
Internet Safety Begins with All of Us Now’s the time to pause for a moment and consider just how important the internet is to us. Not just any internet. A safer internet. June marks Internet Safety Month. Why June? The original thought was that the onset of summer sees more kids online, making it an […] more…Online shopping scams – 7 ways to fight them
Be wary of online shopping scams – 7 ways to fight them While some of us may be quite skilled at finding miscellaneous gadgets and great deals on apparel online, relying on e–commerce platforms for all of our basic household needs is a new challenge. Many of us preferred to shop at brick and mortar retail for certain purchases such as groceries or pharmaceuticals. Now that we’ve turned online for all our shopping needs, online […] more…The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer electronics industry to show off the latest and greatest cutting-edge innovations in technology. From bendable tablets to 8k TVs and futuristic cars inspired by the movie “Avatar,” CES 2020 did not disappoint. Here are a […] more…Parents: You May Want to Pay Closer Attention to the TikTok App
You aren’t imagining things. Everyone is talking about the popular video-sharing app TikTok. That’s because it has simultaneously become both a source of entertainment for kids as well as a source of concern for some adults. The social network, owned by Chinese parent company ByteDance, recently reached 750 million downloads, pushing its popularity ahead of […] more…The Seven Main Phishing Lures of Cybercriminals
One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online (AOL) every day. And if we know one thing about cybercriminals, it’s that they tend to follow the masses. In earlier iterations, phishing attempts were easy to […] more…How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple iPhone vulnerabilities using websites to infect final targets. The key concept behind this type of attack is the use of trusted websites as an intermediate platform to attack others, and it’s defined as a watering hole […] more…More information
- Hidden details about the last Skype spread malware
- Obama commutes sentence for Manning, a WikiLeaks source
- Samsung accused of labor violations in China
- RSA 2017: SophosLabs report examines Top 10 Android malware
- CISA Warns Organizations of Exploited Vulnerability Affecting .NET, Visual Studio
- Cybersecurity no longer merger afterthought
- New Windows code injection method could let malware bypass detection
- Ransomware protection — what you may be missing
- Security of North American Energy Grid Tested in GridEx Exercise
- Equation: The Death Star of Malware Galaxy