New Malware Sends Offensive Texts From Your Phone

Malware tends to be at its most effective when it exists in secret. Under the radar. This is what allows malicious code to burrow deep into an infected system and capture a wide range of data. It’s what allows cryptojacking software to quietly siphon off computer power to mine for …

Windows 7 Has Reached The End Of Support

Microsoft would like you to know that Windows 7 has reached the end of the road. No more security updates are coming, and there are no more patches or bug fixes. So from here, every newly discovered security flaw is essentially a zero-day issue. The company has been loudly advertising …

iPhone Now Works As A Security Key For Google

Google continues to improve security and its user experience in the Apple ecosystem. The most recent update to the company’s Smart Lock app on iOS allows users to use their iPhone as a physical security key (if and where two factor authentication technology is enabled). Once it’s set up, it …

Wyze User Information Leaked Include Emails And Other Data

Wyze is one of the many manufacturers of consumer-grade smart devices. They recently confirmed that user data belonging to nearly two and a half million of its customers was exposed. The root cause of the exposure was traced back to an unsecured database connected for nearly a month to an …

New Updates To This Malware Made It More Dangerous

If you haven’t yet heard of a malware strain called ‘Predator the Thief’, it’s something that belongs on your radar. It first emerged as a threat in July of 2018, when it was used in conjunction with an extensive phishing campaign. In its original incarnation, it proved more than capable …

Landrys Restaurant Chain Latest Victim Of Credit Card Breach

If you’re not familiar with Landry’s, you’re probably familiar with at least some of the restaurants the company owns. The company recently issued a formal ‘Notification of Data Breach’ in which they disclosed that an unauthorized user was detected on their systems and that POS malware had been used between …

New Hacking Method Looks Like A Locked Computer

Scammers have breathed new life into an old scam. For years, the old ‘Law Enforcement Lock’ trick has been used to cheat unsuspecting victims of their hard-earned money. The new wrinkle works like this: Scammers will redirect users using the Chrome web browser to sites that host a full-screen image …

Support For Many Microsoft Apps Will Stop In 2020

The year 2020 looks to be interesting and exciting in a variety of ways, but it also will usher in a tremendous amount of change. If you’re an IT manager, be aware that this year a number of Hallmark Microsoft products will reach their End of Support. That means the …

Message Recall Feature May Be Added To Office 365

For a while now, Microsoft Outlook users have enjoyed a highly popular addition to their email service. In a nutshell, it allows them to recall messages that have been sent using Outlook, which is an Exchange Online hosted cloud email service for business. They can un-send the emails, provided that …

ISO Files Are Being Used To Deliver Malware

Researchers at Trustwave have observed a notable increase in the use of .ISO files to deliver malware. Hackers have relied on poisoned disk image files for years to deliver malware to their targets. It makes sense in a Windows environment because it allows attackers to disguise their payloads as an …