Suspicious Files Get New Warnings In Google Drive
If you have Google Drive, there's good news. The company has recently announced that soon they'll be rolling out a new feature to help alert users to the presence of […]
If you have Google Drive, there's good news. The company has recently announced that soon they'll be rolling out a new feature to help alert users to the presence of […]
Hackers have recently hit upon a new money-making scheme. Some groups have started breaking into Instagram accounts belonging to people with high numbers of followers. They are then holding those […]
Google partner Zimperium zLabs has recently discovered a sophisticated scam targeting more than 100 million Android users. The scam has been in operation right under Google's nose for nearly two […]
There's good news for Apple users. The company has been busy and has recently released security updates that address two Zero-Day vulnerabilities. These are security flaws that could be exploited […]
One of the most persistently frustrating aspects of our highly interconnected world is that we seem to exist in at least three different distinct ecosystems. Apple users live in the […]
There is a new phishing campaign to keep a watchful eye on according to email security firm INKY. It's a particularly fiendish one. The attackers have designed an email template […]
Cisco recently discovered a critical security flaw in their Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS. The vulnerability allowed an attacker to execute code arbitrarily and gain root-level access […]
The WP HTML Mail plugin has been installed on more than 20,000 websites. If you've built a WordPress site for your business and you use that plugin, be aware that […]
When Apple first released iOS 15 they posted a promise on their website. That promise was: "If you're using iOS or iPadOS 14.5 or later, you might now see the […]
Scammers delight in impersonating government agencies and well-known brands to lure email recipients into giving up their personal information. That information is then either exploited directly or sold to the […]