Hackers Are Using NFT Excitement To Trick Users

Researchers from Fortinet are warning of a new threat to be on the lookout for. Right now, NFTs are all the rage.  Everyone is talking about them, and many are excited about them.  Hackers have been quick to take advantage of that fact, and the Fortinet researchers have stumbled across a poisoned spreadsheet that purports to contain information about NFTs. …

Microsoft Defender Adds Cross Platform Mobile Protections

Microsoft recently announced an important upgrade to Microsoft Defender. It now supports vulnerability management for both Android and iOS. The company’s announcement reads in part as follows: “With this new cross-platform coverage, threat and vulnerability management capabilities now support all major device platforms across the organization – spanning workstations, servers, and mobile devices. Threat and vulnerability management in Microsoft Defender …

Microsoft Defender Adds Cross Platform Mobile Protections

Microsoft recently announced an important upgrade to Microsoft Defender. It now supports vulnerability management for both Android and iOS. The company’s announcement reads in part as follows: “With this new cross-platform coverage, threat and vulnerability management capabilities now support all major device platforms across the organization – spanning workstations, servers, and mobile devices. Threat and vulnerability management in Microsoft Defender …

Mac Malware Is Becoming A Bigger Threat For Users

In late 2020 a new strain of malware called UpdateAgent appeared and began infecting Mac users. Initially the strain wasn’t all that worrisome.  It stole system information but it was by no means the worst threat on a Mac user’s radar. Since that time, the hackers behind the malicious code have been busy. UpdateAgent has received a few developments, with …

Phishing Facts image

Facts About Phishing That You Need to See

Some of the most devastating cyberattacks in history, including incidents like the Colonial Pipeline ransomware disaster, started with a humble phishing email. Phishing is the type of cyberattack employees see the most by far. Phishing is an easy way for bad actors to obtain passwords, user data and other credentials, enabling them to undertake other cybercrime operations like business email …

Skype Adds Zoom Feature And Additional Modern Updates

Are you a Skype user?  If so be aware that Microsoft (the company that owns Skype) just added a handy new feature you may want to start taking advantage of right away. The next time you update your software you’ll be able to zoom in on a screen shared by the user you’re communicating with. To do so just hold …

T-Mobile Reports Scam Calls Have Increased 116 Percent Since 2020

If you’re like most cellphone users,  you absolutely love the automatic call blocking feature that most companies offer as part of their standard service.  A call comes in from a “suspicious” number and the phone just blocks it. That’s awesome and even better is you can add new numbers to it.  So on those occasions when a spam call gets …

Log4j Exploit

The Largest Cyber Breach Ever Seen

By now you’ve probably heard about the log4j exploit that is wreaking havoc across the connected world. In a nutshell, log4j is a bit of code that helps software applications keep track of their past activities, and it’s everywhere. Log4j is found in the Java programming language, on which much of the apps that define how we live today have …

Microsoft Office Is Rolling Out A New User Interface

Microsoft is making a few UI changes across its entire product line in anticipation of rolling out Windows 11.  Early this year (2021) the company announced that they were updating the UI for Office 365 and Office 2021. Over the summer small groups of users participated in an open beta and began playing with the updated versions of those app …

Twitter Increasing Privacy With Stricter Picture And Media Sharing

Recently Twitter’s CEO stepped down. Since then, the company has been gearing up to make some changes that many of the industry’s insiders regard as long overdue. The first of these changes has now been rolled out with the company modifying its privacy policy and outlining new rules related to the sharing of pictures and videos. The company explained the …