Microsoft Is Hosting a Summit to Improve Cybersecurity

July’s CrowdStrike outage was a disaster. One buggy update from the company caused networks across the globe to shut down, leaving businesses paralyzed, airline customers stranded, and everyone looking for explanations and solutions. Microsoft, of course, was caught in the middle of the debacle: While macOS and Linux customers were not affected by the CrowdStrike bug, only Windows customers were. …

Did You Know Your iPhone Can Automatically Sort Your Grocery List?

Forget the pen and paper when you head to the supermarket: Your iPhone is a convenient way to keep track of all the items on your grocery list. Looking at a recipe online? Just jot down all the ingredients in a list. Think of something on your way to the store? Add it in. As convenient as it is, however, …

Try to Keep Your Phone Out of the Sun

Smartphones are a part of daily life, so of course they accompany us outside during summer. But with summer, comes the sun: While you might like sitting on the beach in the sun all day, your smartphone does not. If you can, try to keep your iPhone or Android out of direct sunlight this summer. Your smartphone really soaks up …

The NSA Wants You to Regularly Turn Your Smartphone Off and On Again

How often do you turn your smartphone off? That doesn’t mean how often you put your phone “to sleep.” Hitting the power button and watching your display dim down doesn’t mean the phone is actually off—it’s just snoozing. For most of us, that’s just fine. Our smartphones continue to work well enough without needing to power down the entire device …

Google Patched a Fourth Zero-Day Vulnerability in Chrome

Google Chrome is the most popular web browser in the world. Chances are, you either use Chrome, or a browser based on the same platform (Chromium), such as Microsoft Edge. With that in mind, when a security vulnerability is discovered in Chrome, it’s a big deal, especially when that vulnerability is a zero-day. However, it’s an even bigger deal when …

Hackers Break Into Dropbox Sign, Stealing Customer Information

As companies employ new tactics to defend themselves against cyberattacks, hackers continue to find a way in. So it is with Dropbox: The company is the latest to be hacked, as bad actors broke into production systems for the Dropbox Sign eSignature platform. These hackers were able to obtain authentication tokens, MFA keys, passwords (hashed), and the information of Dropbox …