New Updates For Office 365 Will Include Phishing Protection

Are you an Office 365 user? If so, be aware that Microsoft is adding some powerful new protections to the software suite, designed to make you safer. Hackers commonly target Office 365 users with a type of attack known as “Consent Phishing.” That basically means that the hacker in question will use a variety of social engineering techniques to try …

Cisco Data Center Manager Software Users Should Patch Immediately

Do you use Cisco’s Data Center Manager Software? If so, be advised that the company recently issued an advisory concerning a serious security flaw. The advisory reads, in part, as follows: “The vulnerability exists because different installations share a static encryption key. An attacker could exploit this vulnerability by using the static key to craft a valid session token. A …

Cyber Attack graphic

What’s Selling On The Dark Web?

When you picture what sells in Dark Web markets, you’re probably thinking about things like stolen corporate data, pirated software, and lists of passwords. But that’s not the whole picture – and what you don’t know can hurt you, because it might just fuel the next cyberattack against your business. 60% of the Information for Sale on the Dark Web …

New Chromium Based Edge Browser Update From Windows 10

Microsoft has been talking for months about their new Edge browser based on Chromium technology. Users will finally be able to see it in action as of the KB4559309 Windows 10 update, which will replace the legacy Edge browser with the company’s latest offering. It should be noted that previous Windows 10 releases did include the new Chromium-based Edge browser, …

Microsoft’s Edge Browser To Release New Features

Microsoft recently re-reinvented its web browser. After finally giving up on bug-plagued Internet Explorer, the company introduced Microsoft Edge, which it hoped would take the internet community by storm. When that didn’t happen, they re-introduced Edge, this time as a Chromium-based browser, which essentially made it a Google Chrome clone. The company is clearly not thrilled with that. Since the …

Hackers Stopped With Help of Microsoft Digital Crimes Unit

Microsoft’s Digital Crimes Unit (DCU) recently played an instrumental role in taking down a botnet made up of more than 400,000 devices. A botnet is a tool that hackers use to invade systems. The botnets were rented out to a variety of groups to conduct DDoS attacks, launch phishing campaigns, and deliver a variety of different types of malware. Of …

Private Twitter Files May Have Been Cached In Firefox

Are you a regular Twitter user? More specifically, are you a regular Twitter user who also prefers the Firefox web browser? If so, be advised that Twitter recently disclosed a new bug with potentially dire implications for you. Apparently, a flaw in the design of the platform itself caused it to store private files inside Firefox’s browser cache. The cache …

Over 1 Billion Android Devices No Longer Get Security Updates

According to the latest statistics, there are more than 2.5 billion Android devices in use around the world. That’s a lot of devices by any reckoning. According to statistics gathered by Consumer Watchdog Which?, more than a billion of those devices are no longer receiving security updates. That is scary. That puts an awful lot of devices at grave risk. …

People Are Moving From Windows 7 To Windows 10 For Security

Despite the age of the OS, Windows 7 has enjoyed a surprisingly large and loyal user base. That changed suddenly when Microsoft finally pulled the plug on Windows 7 support. It couldn’t have come as a surprise to many people. After all, the company has been sounding the alarm and has announced the end of support date for more than …

New Malware Sends Offensive Texts From Your Phone

Malware tends to be at its most effective when it exists in secret. Under the radar. This is what allows malicious code to burrow deep into an infected system and capture a wide range of data. It’s what allows cryptojacking software to quietly siphon off computer power to mine for various forms of cryptocurrency. That makes money for the malicious …