Articles
Latest Articles
Beware ‘SearchNightmare,’ the Latest Microsoft Vulnerability
Last week, we covered "Follina," the Microsoft security vulnerability affecting Microsoft Office documents. After you opened an affected Office document, a bad actor could potentially take control of your system. This week, the threat turns to "SearchNightmare," another Microsoft vulnerability....
June 7, 2022
Don’t Let Hurricanes Impact Your Systems
Severe weather events, like hurricanes, are common, but nevertheless devastating. When high winds and torrential rains interfere with electricity and power, shutting down networks and systems, business grinds to a halt. With the proper precautions, however, you can ensure your business...
June 7, 2022
How to Avoid ‘Facestealer’ Malware on Android
Malware on Android isn't a rare topic, unfortunately. While Google has a system to vet apps on the Play Store, hackers are clever, and find ways to slip malicious software through the cracks. "Facestealer" is the latest such software to...
May 31, 2022
Watch Out for This Microsoft Office Vulnerability
Security vulnerabilities aren't fun, especially when they affect products we rely on every day. A new vulnerability, dubbed "Follina," unfortunately targets a suite of apps you likely use all the time: Microsoft Office. Follina, which Microsoft has identified as CVE-2022-30190,...
May 31, 2022
Apple Releases Security Patches for All Devices
Last week, Apple released security patches for the iPhone, iPad, and Mac. While the company didn't advertise these software updates as security patches, the new versions fix dozens upon dozens of security vulnerabilities across iOS, iPadOS, and macOS. If you...
May 23, 2022
You Can Remove Your Personal Information From Google
Google is a powerful, essential search engine that helps us find everything from new recipes to affordable flights. But unless you're trying to sell something attached to your name, you probably don't want your personal, identifying information available on Google...
May 23, 2022
It’s Possible to Hack an iPhone When Powered Off
With the infamous Pegasus malware making the news, the idea of bad actors installing malicious software on your iPhone isn't far fetched. However, that malware usually gets there when the phone is turned on. As it happens, researchers have found...
May 17, 2022
Microsoft Edge Deletes Cookies Every Time You Close Your Browser
When you use an internet browser, like Google Chrome or Microsoft Edge, you generate cookies. Cookies are used to track your activity across websites as you browse, which can be an invasion of privacy. Edge has a built-in solution. Microsoft...
May 17, 2022
AirTags Have a Built-In Anti-Stalking System
Apple's AirTags are a convenient way to keep track of your various items, but they can also pose a security risk. Let's take a look at how Apple designed a system to protect the public against would-be AirTag stalkers. Let's...
May 10, 2022
Spanish Prime Minister Newest Target of Pegasus Spyware
Pedro Sánchez, the Prime Minister of Spain, as well as defense minister Margarita Robles are the latest two targets of the NSO Group's Pegasus spyware. This is the first time the Prime Minister has been the subject of Pegasus spyware,...
May 10, 2022










