- Welcome Guest
- Sign In
Cybersecurity and privacy threats aren't confined to the tech world. They've cast their pall on the world in general. Computer viruses, malware and data leaks have become commonplace, personal privacy has become a bad joke, and cyberwar looms like a virtual mushroom cloud. What sometimes gets lost i...
Cybersecurity risks for 2020 stretch far beyond the alarming spike in ransomware. In addition to the daily concerns of malware, stolen data, and the cost of recovering from a network intrusion, there is the very real danger of nefarious actors using cyberattacks to interfere with the 2020 U.S. gener...
After 10 years of fully supporting Windows 7, Microsoft ended its official support for the out-of-date Windows operating system on Tuesday. The popular classic Windows 7 OS still runs on some 200 million PCs around the globe, according to industry estimates. Users include small business owners, some...
Ransomware tops the list of cybersecurity threats for 2020. While there have been efforts to convince individuals, corporations, and municipalities not to pay ransoms, the simple fact is that whenever one is paid, the attack becomes a success that encourages cyber thieves to try again. Ransomware at...
Google has released an update to its Chrome browser with a slew of new features that are heavy on security. The new version offers improved password protection over earlier versions, real-time phishing protection, and predictive phishing tools. Fifty-one security fixes is high compared with past Chr...
Microsoft will end support for the Windows 7 operating system on Jan. 14, 2020. Windows 7 will continue to run on Jan. 14 as it did on Jan. 13. So why is it so important to upgrade to Windows 10? The answer: cybercrime. End of support means that Windows 7 no longer will receive the OS patches or sec...
Flaws in Amazon and Google smart speakers can expose users to eavesdropping and voice phishing. Researchers at Security Research Labs discovered that developers could create malicious apps for the Amazon and Google platforms to turn the smart speakers into smart spies. Using the standard development...
Online tech support scams have been on the rise for the past decade, as hackers found new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true scam currently relies on sophisticated social engineering, fueled by detailed user info...
October is National Cyber Security Awareness Month, and one of the prongs in the three-part theme is for all computer users to "Own IT." This means staying safe on social media, updating privacy settings, and keeping tabs on apps. Simply put, users need to take better ownership of their data and the...
Two eGobbler malvertising exploits impacted 1.16 billion programmatic ads between Aug. 1 and Sept. 23, according to Confiant, which has been tracking the threat for about a year. The first targeted versions of Chrome prior to Chrome 75 on iOS. The flaw was fixed in the Chrome 75 rollout June 4. he s...
Cybersecurity should be a concern for all businesses -- large and small. Cybersecurity also should be a concern for consumers, government agencies, and basically anyone who relies on the Internet in our increasingly connected world. However, far too many people still disregard the threats.
Users of a multi-cloud storage strategy may be twice as likely to face a security breach as those that use hybrid or single clouds, suggests a report from UK-based security specialist Nominet. Fifty-two percent of survey respondents who adopted a multi-cloud approach suffered a data breach over the ...
Google, Mozilla and Apple have blocked a fake root certificate issued by Kazakhstan's government to spy on its citizens' online activities. The government instructed citizens to install the certificate on all of their devices, and it provided separate instructions for Android, iOS, Chrome, Firefox, ...
Numerous driver design flaws by 20 different hardware vendors expose Microsoft Windows users to widespread security compromises that can cause persistent malware attacks. A report titled "Screwed Drivers," which Eclypsium security researchers presented at DEF CON, urges Microsoft to support solution...