Cybercriminals are bypassing two-factor authentication using fraudulent online bot services automating phone calls, targeting multiple countries. Read more about how to protect from this threat. Single-factor authentication should not be used anymore Single factor authentication has been the standard for
Read More about Cybercriminals use automated bot to bypass 2FA authentication at wide scaleHow Microsoft blocks vulnerable and malicious drivers in Defender, third-party security tools and in Windows 11
Device drivers have so many privileges in Windows that, if compromised, they can be used as a way to attack the system and even turn off anti-malware software. Recent malware attacks like RobbinHood, Uroburos, Derusbi, GrayFish and Sauron have used
Read More about How Microsoft blocks vulnerable and malicious drivers in Defender, third-party security tools and in Windows 11Microsoft Office zero-day vulnerability that allows remote code execution is being actively exploited
Attackers leverage ActiveX to infect systems with malware Why it matters: Microsoft has received reports of a remote code execution (RCE) vulnerability (CVE-2021-40444) hackers are actively exploiting. The attack uses maliciously crafted Microsoft Office files that open an ActiveX control using the
Read More about Microsoft Office zero-day vulnerability that allows remote code execution is being actively exploitedExcel is still a security headache after 30 years because of this one feature
Threat researcher explains why it’s tricky to tell the difference between legitimate Excel Macros and ones that deliver malware. Released Excel 4.0 for Windows 3.0 and 3.1 in 1992 and many companies still use this functionality in legacy operations. The
Read More about Excel is still a security headache after 30 years because of this one featureThe most secure browser for transmitting sensitive data is definitely not Chrome
Jack Wallen addresses the challenging question of which browser is best to use for transmitting encrypted data. TL:DR: Tor. Yep, that’s the answer. The most secure browser for encrypted data is Tor. But there’s a catch, and it’s a big
Read More about The most secure browser for transmitting sensitive data is definitely not ChromeAndroid app users targeted with cryptomining scams
Found on Google Play and third-party app stores, the apps discovered by Lookout stole an estimated $350,000 from more than 93,000 people. More than 170 Android apps, including 25 on Google Play, have been caught trying to scam people by
Read More about Android app users targeted with cryptomining scamsCritical vulnerability in Windows Print Spooler service leaves PCs open to remote code execution
‘PrintNightmare’ exists on all Windows versions; Microsoft currently advises either disabling the service or blocking inbound remote requests A hot potato: It’s not the first time IT admins and users have been alerted to a flaw in the Windows Print Spooler service.
Read More about Critical vulnerability in Windows Print Spooler service leaves PCs open to remote code executionRansomware attackers are now using triple extortion tactics
Attackers are not only demanding ransom from organizations, but also threatening their customers, users and other third parties. Cybercriminals who specialize in ransomware have already been using double extortion tactics in which they not only decrypt stolen data but also
Read More about Ransomware attackers are now using triple extortion tacticsYour Google accounts will soon default to ‘two-step verification’
There was an uproar that it would be mandatory, but Google clarified that is not the case In a nutshell: World Password Day was last Thursday. In honor of the day, Google announced that it would soon make two-factor authentication default for
Read More about Your Google accounts will soon default to ‘two-step verification’Still using Windows 7? These security tips will protect your laptop now that support is dead
You should upgrade to Windows 10 as soon as possible, but if you just can’t or won’t, we’ll show you how to level up your Windows 7 security until you can protect your computer. If you use a Microsoft laptop or desktop
Read More about Still using Windows 7? These security tips will protect your laptop now that support is dead