Android Users Will Get Additional Gmail Features

If you access your Gmail account via your PC it currently has features that simply don’t exist on the Android Gmail app. Specifically with regards to its email search options. These make it easy to find the exact email you’re looking for no matter where it might be buried in your inbox. The good news is that Google has recently …

Update Apple Devices Soon For Important Security Patch

Apple released a very important security update today. The update fixes a pair of zero-day vulnerabilities that have been spotted in use in the wild to attack both Macs and iPhones. One of the two has been used to install the Pegasus spyware onto iPhones. These two vulnerabilities are being tracked as CVE-2021-30860 and CVE-2021-30858 respectively. Both vulnerabilities allow attackers …

Instagram Will Require Age Verification Soon

More and more social media platforms are taking steps to improve protections for younger folk. Instagram is the latest company to take steps in that direction with the recent announcement that the platform will soon require users to provide their date of birth if they have not already done so. The DOB prompts are already present and if you’re an …

Lockbit Ransomware Is Trying To Become Unstoppable

Over the last couple of years ransomware has become the malware of choice for hackers around the world. It’s easy to understand why. Hackers using malware win in two different ways. If they successfully breach a corporation they can steal copies of important files and sell them on the black market. They can simultaneously demand a fat payout from the …

Some Older Printer Drivers Are Vulnerable To Hackers

SentinelOne recently published a report that revealed a previously undiscovered security flaw found in a wide range of printers that include printers manufactured by Samsung, Xerox, and HP. The bug is being tracked as a high severity security vulnerability and puts hundreds of millions of older printers in currently in service at risk. The flaw allows an attacker to gain …

Morgan Stanley Banking Latest To Get Hit By Data Breach

Hacks continue to evolve as the hackers themselves get increasingly sophisticated. One of the most recent victims is investment banking giant Morgan Stanley. Their network was breached after the attackers stole personal information belonging to their customers by hacking into an Accellion FTA server belonging to a third-party vendor, then using that information to breach Morgan Stanley’s network. The third-party …

Apple M1 Macs Are Not Immune To Malware

Patrick Wardle is a legend in the Apple ecosystem, and one of the best independent security researchers out there. Not long ago, he sang Apple’s praises for the security of their M1 processor. More recently however, he made a rather disturbing discovery, finding malware in the wild that specifically targets the new chip. Wardle had this to say about the …

Hackers Are Using DDOS Attacks To Profit Off Businesses

Distributed Denial of Service Attacks (DDOS) have been used by hackers since the earliest days of the web. Get enough internet-connected devices to ping a server at the same time, and you can knock the server offline. Keep the pressure on and you can keep it offline, pretty much indefinitely. These days, given the web’s importance, that can easily bring …

New Version Of Jupyter Malware Spotted In The Wild

Researchers from cybersecurity company Morphisec have recently discovered a new strain of malware they believe has been in the wild of the internet since at least May of this year (2020). Dubbed Jupyter, this strain is classed as an Info Stealer. It focuses on getting into user names, passwords and other private systems and exfiltrating that data to a server …

New Updates For Office 365 Will Include Phishing Protection

Are you an Office 365 user? If so, be aware that Microsoft is adding some powerful new protections to the software suite, designed to make you safer. Hackers commonly target Office 365 users with a type of attack known as “Consent Phishing.” That basically means that the hacker in question will use a variety of social engineering techniques to try …