You won’t get a job – but you might get a virus If you’re hiring, or looking to get hired for a new job – be very careful who you talk to. Cybersecurity researchers from Palo Alto’s Unit 42 have
Read More about North Korean hackers are posing as job interviewers – don’t be fooled
Google is developing ‘Private Spaces’ for Android that hides photos, apps, and data
Options have existed to hide certain photos and apps for years, but Google is working on an all-in-one solution that’s more secure than ever. While wanting to keep certain apps, data, and photos on our phones private is nothing new,
Read More about Google is developing ‘Private Spaces’ for Android that hides photos, apps, and data
If you haven’t updated WinRAR in the past few weeks, do so now
PSA: If your WinRAR installation is older than version 6.23, released in August, you should update the software as soon as possible. The latest version patches a vulnerability that has been known for months. Recent reports indicate that state-backed hackers are actively exploiting
Read More about If you haven’t updated WinRAR in the past few weeks, do so now
A New Protocol Vulnerability Will Haunt the Web for Years
Dubbed “HTTP/2 Rapid Reset,” the flaw requires making patches available for virtually every web server around the world before the problem can be eradicated. GOOGLE, AMAZON, MICROSOFT, and Cloudflare revealed this week that they battled massive, record-setting distributed denial of service attacks against
Read More about A New Protocol Vulnerability Will Haunt the Web for Years
Ransomware access broker steals accounts via Microsoft Teams phishing
Microsoft says an initial access broker known for working with ransomware groups has recently switched to Microsoft Teams phishing attacks to breach corporate networks. The financially motivated threat group behind this campaign is tracked as Storm-0324, a malicious actor known
Read More about Ransomware access broker steals accounts via Microsoft Teams phishing
Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits
A significant portion of social engineering attacks, such as phishing, involve cloaking a metaphorical wolf in sheep’s clothing. According to a new study by Abnormal Security, which looked at brand impersonation and credential phishing trends in the first half of 2023,
Read More about Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits
FBI: Hackers Are Having a Field Day With Open-Source AI Programs
To no one’s surprise, criminals are tapping open-source generative AI programs for all kinds of heinous acts, including developing malware and phishing attacks, according to the FBI. The agency on Friday held a call with journalists to discuss how generative AI programs—which are all the
Read More about FBI: Hackers Are Having a Field Day With Open-Source AI Programs
How to Completely Remove Your Online Presence
Embarrassing old posts, data brokers selling your information, a desire for more privacy; there are any number of reasons for wanting to erase yourself from the internet. But is it actually possible to delete yourself entirely? The short answer is
Read More about How to Completely Remove Your Online Presence
Hackers are exploiting Windows loophole to load malicious drivers
Why it matters: Hackers have been exploiting vulnerable drivers for years, and Microsoft can’t easily fix the underlying issue without angering some of its paying customers who are using older software. Over the past few years, a Windows policy loophole allowed
Read More about Hackers are exploiting Windows loophole to load malicious drivers
Meta’s Threads app is a privacy nightmare that won’t launch in EU yet
Meta’s planned Twitter killer, Threads, isn’t yet publicly available but it already looks like a privacy nightmare. Information provided about the app’s privacy via mandatory disclosures required on iOS shows the app may collect highly sensitive information about users in order
Read More about Meta’s Threads app is a privacy nightmare that won’t launch in EU yet