Microsoft Patches Six Exploited Zero-Days

Microsoft’s Patch Tuesday is a regularly scheduled affair. The rollout occurs on the second Tuesday of every month, and allows Microsoft to release all available security updates and bug fixes at once. Sometimes, Patch Tuesday is a boring update, but, other times, it’s chock full of fixes for serious security vulnerabilities. This latest Patch Tuesday is the latter. Microsoft’s last …

Android Vulnerability Allows Anyone to Bypass the Lock Screen

When setting up your smartphone, choosing a strong passcode and utilizing available biometric authentications (like face and fingerprint scans) are usually enough to keep intruders away. However, a newly discovered Android vulnerability means anyone can bypass the lock screen and break into your smartphone. The new vulnerability comes to us from cybersecurity researcher David Schütz. Schütz was using his Pixel …

UK Internet Devices Will Be Scanned by the British Government

Cyberattacks and cybersecurity threats are an unfortunate part of modern life. As such, governments around the world have had to find new tactics to deal with the rising cyber threats against their nations’ companies and organizations. The British government, it seems, is taking aggressive actions. As reported by Bleeping Computer, the United Kingdom’s National Cyber Security Centre (NCSC), the agency …

Don’t Fall for This Instagram Scam

Popular social media apps like Instagram have billions of users. It’s a staggering amount of people, but to hackers, it’s an opportunity. While scams on Instagram aren’t new, there is an emerging scheme that is dangerous, since it plays off of a real Instagram feature. A new Instagram scam (or Instascam) has started to hit user’s direct messages. Here’s how …

Not All Messaging Is Equally Secure

It’s not recommended to send sensitive information in a message. After all, you never really know who’s on the other end. However, not all messaging is the same: Should you need to message a contact securely, you’ll want to make sure you’re using the right platform. Luckily, not only are there plenty of options, you probably use one of them …

Twitter Faces a New Verification Scam

Elon Musk has finally taken control of Twitter. After months of news headlines and speculations, Musk has acquired the social media company and taken the helm as CEO. While there is plenty of discussion about this new leadership, and the change that will come with it, there is now a cybersecurity issue certain users need to watch out for. The …