Articles
Latest Articles
New Vulnerabilities Threaten Backup Systems for Major Institutions
Uninterruptible power supply (UPS) devices are used for supplying backup power in case of an outage. These devices are used primarily in institutions such as hospitals, industrial systems, and server rooms. A new report spells bad news for these devices,...
March 15, 2022
Video Call Tip: What’s Your Name?
When you join a video call, whether on Zoom, Teams, or another platform, an important aspect is one that's taken for granted: Your name. You likely don't think about your video call name at all; you set it once and...
March 8, 2022
Hackers Steal Samsung Galaxy Source Code
Samsung announced on Monday, March 7, that hackers successfully stole source code for the company's Galaxy smartphones. This type of attack isn't something we hear about daily, so it's an important red flag in cybersecurity news. The hacker group responsible,...
March 8, 2022
Be On Alert From Increased International Cyberattacks
The ongoing conflict—and now war—between Russia and Ukraine is dangerous in many ways, not least of which in terms of cybersecurity vulnerabilities. As the war presses on, you'll need to be on the lookout for Russian cyberattacks, since the country...
March 1, 2022
You Should Update Google Chrome Immediately
Google is generally good at reminding you to update your browser. If you don't check on your own, you'll eventually see a little "update" button in your window's menu bar. However, don't wait for Google to recommend this latest update,...
February 22, 2022
Scammers Will Use Your Leaked Passwords Against You
Data breaches are serious events in more ways than one. Of course, your passwords being out in the open is a huge security risk, since bad actors can use them to break into your accounts. However, there's another nefarious way...
February 22, 2022
Update Your Apple Devices Now If You Use Safari
If you use an iPhone, iPad, or Mac, you likely rely on Safari for your web browsing. If your device isn’t fully up to date, however, you might be placing your browsing, and the personal data that comes from it,...
February 15, 2022
Apple’s Upcoming iPhone Update Lets You Unlock With a Mask
One of the byproducts of wearing a mask throughout the pandemic has been its effect on the iPhone's Face ID. The secure authentication method relies on scanning your face to work; if half your face is obscured by a mask,...
February 8, 2022
Be On Alert for Microsoft Office Website Scam
Microsoft has identified a multi-stage phishing attack against a number of users. The company reported that hackers took stolen credentials, and registered devices on the targets' networks, which were then used to deploy phishing email scams. This latest fishing scheme...
February 8, 2022
Watch Out: There Are Many Fake COVID Sites on the Web
When you're a scammer, your goal is to trick people any way you can. A common tactic is to create websites that appear legitimate, or are close to the real deal, while really acting as a means for you to...
January 31, 2022