Most Recent Articles
Next Time You Visit Your Parents, Take These 5 Steps to Secure Their Devices
If you’re the family’s go-to tech support, you’re probably used to rescuing your parents or elderly relatives from frozen screens, forgotten passwords, and mysterious error messages. But beyond quick fixes, have you checked whether their devices are ac…
How to Explain Loot Boxes and In-Game Purchases to Kids
Have you ever wondered why your child keeps asking for money to buy things in their favorite game? If so, you’re not alone. Many parents find themselves caught off guard by the world of loot boxes and in-game purchases.
Loot boxes and in-game purcha…
WhatsApp Patches Zero-Click Spyware Attack Vector on Android
WhatsApp has addressed a vulnerability used in mercenary spyware attacks on high-profile targets.
The Citizen Lab has published an investigation into the Israeli developer of surveillance software, Paragon Solutions, “to untangle multiple threads conn…
The TikTok Blackout Challenge: How to Protect Children
The TikTok Blackout Challenge, also known as the “choking game” or “pass-out challenge,” is a highly dangerous trend that involves cutting off oxygen to the brain to induce a brief, euphoric sensation. Participants often choke themselves or have someon…
Is Your Real Estate Business an Easy Target for Hackers? How to Protect Client Data
If you work in real estate, you are likely relying more on digital tools for online listings, virtual property tours, and electronic payments and contracts. While these technologies make transactions faster and easier, they also expose your clients’ se…
Unboxing Anubis: Exploring the Stealthy Tactics of FIN7’s Latest Backdoor
In the ever-evolving landscape of advanced persistent threats (APTs), the notorious financial cybercrime group FIN7 has added another sophisticated tool to their arsenal. We have recently discovered a new Python-based backdoor, called “AnubisBackdoor”,…
Supply-chain CAPTCHA attack hits over 100 car dealerships
A security researcher has discovered that the websites of over 100 car dealerships have been compromised in a supply-chain attack that attempted to infect the PCs of internet visitors.
As researcher Randy McEoin explains in a blog post, cybercriminals…
The Safety of Data in the Cloud
This article looks at the safety of your business data in the cloud, focusing on the Microsoft cloud ecosystem and the challenges businesses face with security, vendor overdependence, and managing multiple tenants.
The post The Safety of Data in the Cl…