What Is Google’s Plan For Google Docs Scam Aftermath?
Phishing attacks are a fact of life on the internet these days, but recently, a Google Doc was used in a wide-spread, wildly successful attack that security researchers are calling one of ...
Phishing attacks are a fact of life on the internet these days, but recently, a Google Doc was used in a wide-spread, wildly successful attack that security researchers are calling one of ...
Google is throwing its weight around on behalf of the netizins of the world. Beginning this October, Chrome users will start seeing “Not Secure” warning messages any time they use Incognito Mode ...
Unless you are intimately familiar with digital security, odds are good that you’ve never heard of Snake, Uroburos or Turla. These are three different aliases used by a single group of sophisticated ...
Does your company use IBM Storwize? If you’re not sure what that is, then you probably don’t. It’s the company’s Big Data storage system, and when you purchase it, you get USB ...
Researchers from Check Point Software Technologies have identified a new strain of malware dubbed OSX/Dok that has been found infesting macOS users. The new malware has been primarily found in Europe, and ...
Several months ago, a nasty malware attack caused quite a stir among Google Chrome users. After a flurry of activity, it went dormant. Now, it seems to have returned, and this time, ...
If you’ve recently downloaded an app called SMAVova, you’re not alone. Between one and five million users have done the same. Unfortunately, that’s a problem, and to be safe, you’ll want to ...
Dell has recently released the findings from their End-User Security Survey, and the results will probably keep you up late at night with worry. Their key finding was that an overwhelming percentage ...
There’s a new phone-based scam making the rounds that you need to be aware of. In this case, the scammers are spoofing the number of the Department of Health and Human Services’ ...
Manuel Caballero has been a busy man. If you haven’t heard of him, he’s a security researcher and blogger who made a name for himself identifying a variety of critical security flaws ...