If you eat out or are in the habit of ordering take-out on a regular basis, be aware.Recently, a large, well-organized web-skimming campaign has been uncovered that allowed hackers to swipe the payment card details...
Quantum computing is on the horizon. Unfortunately, it’s been on the horizon for at least two decades. It’s one of those technologies that’s always “just around the corner.”In recent years, however,...
According to ongoing research by Group-IB, a massive phishing campaign is currently underway.This is a campaign that has impacted no less than 130 organizations across a broad range of industries. These include but...
Do you make use of the “MyChart” portal to refill prescriptions, contact your healthcare providers or make appointments?If so, you should know that recently, the healthcare giant Novant disclosed a data breach...
Using different passwords on every website and storing them in a secure password manager is a standard best practice in data security. It’s generally good advice, but what happens when the makers of password vaults...
Do you have the Kali Linux distribution running on one of the machines you own? If you’re not sure what that is, then you almost certainly don’t. Kali is a Linux distro used mostly by “ethical hackers”...
MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system.Unfortunately, no system is bullet proof. There’s a way that a determined...
If you own a Lenovo laptop, be aware that researchers at ESET have recently discovered a trio of bugs reported to Lenovo that could allow an attacker to disable security features and hijack your operating system.The...
Does your company use Microsoft 365? If so, and you’ve noticed that your Office apps have begun to crash mysteriously and inexplicably, be aware that the latest update (build 15330.20298) is the...