Latest Possible Customer Data Breach Comes From Ubiquiti

If you have a network either at home or at your office, it’s quite likely that you’ve got a few pieces of Ubiquiti equipment somewhere in the mix. Ubiquiti is a major player in the network device market, best known for its UniFi line of networking products, paired with a cloud-based management platform. Unfortunately, its success in the market has …

Google Calendar Search Bar Moved For Easier Use

Google calendar is one of the most efficient products that Google made. Although, not as popular as other Google products, users who use it testify that it has made them more productive. In keeping to time, setting appointments, and meeting up to schedules, Google calendar has proven to be very helpful. It gives one control of their time and helps …

Gen Intel Processors May Get Built In Ransomware Protection

At CES 2021, arguably the most influential and significant tech event in the world, Intel made an important announcement regarding its historic eleventh generation of chips. The latest designs will feature hardware-based ransomware detection protocols, which should serve to make those types of attacks less likely to succeed. In 2020, ransomware became the attack vector of choice for hackers around …

Even Big Companies Like Nissan Get Hacked

Even the largest companies in the world can’t claim immunity to hacking, data breaches and momentary lapses in judgment. Nissan is a classic case in point. Recently, due to a careless oversight, default admin credentials were left in place on part of the company’s network. That allowed an unknown third party to easily breach the company’s network and gain access …

Adobe Flash Is Done And Flash Content Is Being Blocked

Adobe has finally done it, as promised. For more than a year, the company has been slow-walking their iconic Adobe Flash Player to its eventual doom. As of December 31st, 2020, Adobe stopped providing support for the product. Not long after, beginning on January 12th, 2021, it made another change that prevented Flash content from running on Flash Player, so …

This New Malware Has A Unique Email Offer

The Quaverse Remote Access Trojan–affectionately dubbed QRat–has been with us since at least 2015. It’s a good piece of malware because it’s notoriously difficult to detect and it provides high value information like passwords, sensitive files, screenshots and more. In addition to remotely offloading files, hackers can assume complete control over any infected system. In the malware world, it doesn’t …

New PayPal Phishing Attempts Are After Your Account Info

Hackers and scammers have hit the ground running in 2021, launching an extensive new phishing campaign that targets the legions of PayPal users around the world. The campaign is being run on both text message and email channels and if you’re a PayPal user, you may have already seen it. If you haven’t, in the days and weeks ahead, you’ll …

Brand New Ransomware Found On The Internet

Hackers around the world didn’t waste any time. New Year’s celebrations have barely ended, and already, we have our first reports of a new malware strain to help ring in 2021. Dubbed Babuk Locker, the strain is aimed squarely at corporate networks. Based on an analysis of the code, security experts have concluded that the software was designed by mid-level …

Big Changes Coming To Microsoft Outlook In Coming Years

Microsoft has been moving toward a unified “single version” of Outlook that would offer a seamless user experience across all platforms and devices. Unfortunately, thus far, that objective has remained elusive. In late 2020, however, the company announced “Project Monarch” which seeks to create a new email/calendar client that will finally accomplish the company’s long-stated goal. Their goal is providing …

Hacker Attacks On Healthcare Industry Are On The Rise

In the early days of the pandemic, several major groups of hackers pledged that their activities would not be aimed at institutions that were engaged in vaccine research. There was at least one high profile instance where the agreement was violated, but for the most part, the hackers kept their word. Research facilities were left largely alone. A bit later, …