Gmail Adding Email Authenticator Feature Called BIMI

Change is coming to Gmail. Recently as a courtesy of a new agreement between Google and the AuthIndicators Working Group you’ll soon begin seeing BIMIs (Brand Indicators for Message Identification). The brains behind BIMI describe their product as an email specification that allows the use of brand-controlled logos within supported email clients. AuthIndicators is steered by a committee of representatives …

BazarBackdoor Uses Compressed Files To Deliver Malware

Security researchers have spotted a new phishing campaign in the wild that you’ll want to make a note of. In this case the hackers are attempting to deliver a malware strain known as BazarBackdoor by using an innovative compression technique and then disguising the malware as an image file. Multi-compression isn’t a new technique but it has never been widely …

Morgan Stanley Banking Latest To Get Hit By Data Breach

Hacks continue to evolve as the hackers themselves get increasingly sophisticated. One of the most recent victims is investment banking giant Morgan Stanley. Their network was breached after the attackers stole personal information belonging to their customers by hacking into an Accellion FTA server belonging to a third-party vendor, then using that information to breach Morgan Stanley’s network. The third-party …

Microsoft Issues Patches For PrintNightmare Bug

If you’re one of the legions of Windows users, you may be aware that the OS currently has some printer issues. In fact, they’re so severe that the bug has been dubbed “PrintNightmare,” and note that this flaw affects all versions of Windows. The good news is that Microsoft got to work just after the issue was initially reported, and …

Ransomware Attackers May Target Industrial Machines Soon

Government officials and some internet security researchers have been saying for quite some time now that the nation’s (and the world’s) core infrastructure is at risk. Some examples include the flow of water into cities, the flow of electricity, and the traffic lights that keep city streets relatively organized. All of these depend on the reliable function of Industrial Control …

Google Calendar Adds Virtual Meeting For Hybrid Office Workers

The pandemic is slowly fading from the headlines and releasing its grip on the world as the dominant factor in daily life. Now, businesses of all shapes and sizes are beginning to transition away from the pure “work from home” models that most have been employing over the past year. Based on the early, emerging trends, it doesn’t seem like …

Fake Apps Stealing Info With Current Cryptocurrency Boom

In case you haven’t been paying attention, the Cryptocurrency markets have been booming in recent months. All of the major currencies have now pulled back from their all time highs, but BitCoin shattered several of its own records recently, as did Ethereum, which crested at a price of more than $3,300. Needless to say, this is causing a surge of …

Chromebooks Get First Optimized Browser Alternative

In the world of internet browsers, most people only think of the Big Three: Chrome, Safari, and Microsoft Edge. Occasionally, Firefox gets an honorable mention, but there are a whole raft of smaller browsers out there if you’re looking for an alternative to the majors. Recently, the little Opera browser made a significant change, becoming the first smaller browser to …

This Malware Could Be Using Your PC To Make Money

If you haven’t heard of a malware strain called Crackonosh, be aware that it might be abusing your system, and specifically, Windows Safe Mode, to make money for its controllers. In fact, since it was first discovered, researchers at Avast estimate that Crackonosh has quietly generated millions by enslaving PCs around the world and using them to mine cryptocurrency. Crackonosh …

Some Netgear Devices May Have Vulnerabilities According To Microsoft

Do you use a Netgear DGN router, either at home or in your office? If so, be aware that Microsoft has discovered a number of security flaws that impact those devices, if they are running a firmware version older than V1.0.0.60. Those vulnerabilities give attackers access to an unpatched router’s management page, which can be used to bypass whatever network …