Both Helldivers 2 and Palworld have seen explosive growth and popularity since their respective releases, drawing in millions of gamers around the world. With this popularity, though, also comes opportunistic folks trying to make a quick buck by piggybacking off the hype. This is exactly what happened both titles...Read more...
Privacy is a hot-button issue for individuals and the enterprise, which has lead to some clever innovations, such as self-destructing USB drives, among other devices. To that end, the Biden administration is looking to address data privacy with a new executive order with a goal to “protect Americans’ sensitive...Read more...
In most cases, it's pretty easy to recognize a phishing scam. Telltale signs include typos, bad grammar, unsolicited attachments, and spoofed email addresses and hyperlinks, to name just a few. So imagine my surprise when I received an email that exhibited none of those traits, at least not initially, in an attempt to...Read more...
The holiday season at the end of the year is a busy time for online shoppers, between taking advantage of the best Black Friday and Cyber Monday deals and ordering gifts for friends and family. Sadly, threat actors have no qualms with taking advantage of the high volume of packages in transit during this time to...Read more...
Earlier this year, threat researchers at the cybersecurity company IronNet discovered a phishing-as-a-service (PhaaS) platform known as Robin Banks. While the name may be humorous, the platform itself is no laughing matter, as it serves to aid cybercriminals in stealing innocent users’ banking credentials. After...Read more...
Today and tomorrow, the White House is convening the second International Counter Ransomware Summit with representatives from over thirty countries and fifteen cybersecurity companies in attendance. This event comes after last year’s first ever summit of the same name, which was held virtually. Leading up to this...Read more...
The cybersecurity firm Group-IB published research today detailing how various threat actors are stealing Steam login credentials using browser windows. Specialists from the computer emegency response team at Group-IB (CERT-GIB) discovered over 150 phishing resources mimicking Steam in just the month of July. Steam...Read more...
While malware and phishing are two different kinds of cyberattacks, threat actors sometimes use both methods in malicious campaigns. A threat actor known as Roaming Mantis appears to be doing exactly that in a new campaign documented by researchers at the cybersecurity firm SEKOIA. Roaming Mantis has previously...Read more...
There are millions of Android apps in Google Play, and while there are safeguards in place to keep malicious ones from sneaking in, a few bad apples inevitably creep through the door. When that happens, millions of devices can end up infected. A recent security report called attention to a handful of them that have...Read more...
There is a strong possibility that if you're reading this website, you are familiar with VLC Media Player. The popular application, which bundles important codecs along with the player rather than relying on the OS to provide them, is the video player of choice for millions of people who became tired of fussing with...Read more...
According to a recent cybersecurity report, ransomware attacks, having doubled in each of the past two years, are on track to outpace phishing attacks as the number one cause of data compromises. That said, phishing attacks are still king for now and will continue to pose a serious threat even if they are surpassed by...Read more...
Another day another security risk. This one happens to get deployed via iffy software deployed on the Microsoft Store. This particular issue is related to installing games via the Microsoft Store, with those games often being clones of legitimate titles, so it is really easy to make this mistake.
Nicknamed Electron...Read more...
If you haven't been keeping up with Windows news, Windows 11 is really trying to be tough on security. As part of that push, one of its major requirements is that your system must have a Trusted Platform Module, or TPM. Historically speaking, that was a physical device on your motherboard that provided an immutable...Read more...
In the spy thriller series Mission Impossible, Ethan Hunt’s directives from his superiors always self-destruct after being viewed. Information security isn’t just for spies, though. Many people face an uphill battle maintaining digital security, but the toughest challenge may be physical attack. You can only do so...Read more...
As ransomware and cybercrime are constantly making the headlines these days in traditional electronic mediums, Zelle banking users are also finding themselves being targeted by scammers. Worse yet, in the wake of having funds stolen from bank accounts, victims are finding little to no help from their banking...Read more...
When it comes to the convergence of convenience and technology, Bluetooth is right up there with the advent of USB, which is why there are billions of devices that support the wireless standard. Frighteningly, they could all be at risk of more than a dozen vulnerabilities discovered by security researchers Matheus E...Read more...
When people are hit by malware, it typically ends with files being locked or some other terrible outcome for the end-user. However, researchers have now discovered a piece of malware that turns the tables on people who try to pirate content by blocking illegal websites. As it turns out, perhaps not all malware is...Read more...
With all due apologies for the disappointing news, you did not win a set of Apple AirPods, no matter what that unsolicited text message you received may have said. The text message is a scam attempt, plain and simple. It has gotten so big that the Better Business Bureau (BBB) felt it necessary to issue a warning to...Read more...
Don't blindly click that link or assume the notification about a system update that you received is real. Zero-day exploits in popular server applications like Solarwinds and Exchange may grab headlines, but the biggest problems most users face with tech security are of the socially-engineered variety. That's the case...Read more...
The SolarWinds breach has been pervasive, and the world is still reeling from the effects. We have heard that hackers accessed data from Microsoft, U.S Government agencies, and other high-profile companies. Now we're learning about the full scope of the data that was allegedly obtained. A website recently appeared...Read more...
We’ve seen ransomware in hospitals and schools, and it wreaks havoc no matter the case. This is especially true when people are relying on technology now more than ever due to the COVID-19 pandemic. The Baltimore County Public School district encountered this firsthand when malicious attackers installed ransomware...Read more...
These days just about everybody takes Bluetooth for granted. Manufacturers phase out useful physical ports like headset jacks in high end devices with the expectation that buyers will use Bluetooth headphones. Our cars, watches, locator tags, home theaters, and even game controllers rely on the ubiquitous short-range...Read more...