Biometric Breach Exposes Fingerprints, Facial Data And Personal Info

Do you employ a biometric security solution at your company to control building access? If your solution employs BioStar 2 technology (which is often integrated into third-party systems such as Nedap’s AEOS access control system), you have cause for concern. Recently, researchers from vpnMentor announced that they uncovered a massive …

New Adware Uses Interesting Technique To Avoid Detection

Being more of a nuisance than anything, adware doesn’t see as many innovations as other forms of malware. Once in a while, an adware developer surprises the security researchers. That happened recently when two researchers working for enSilo discovered an innovation in an adware strain, known as DealPly. As Adi …

CafePress Users Are Latest To Have Information Breached

Hardly a week goes by that we don’t see another major data breach making the headlines. The latest company to fall victim to hackers is CafePress. They are well-known on the internet for offering a platform where users can create their own customized coffee mugs, tee shirts and the like. …

Apple Will Stop Listening To Siri Recordings For Now

Not long ago, both Google and Apple found themselves in hot water when it came to light that both companies had been making use of third-party partners to review Siri recordings. As the companies explained at the time, their goal was to make their voice recognition software more efficient and …

Apple Is Launching Their Own Credit Card Soon

Apple has partnered with Goldman Sachs and their long-awaited “Apple Card” begins rolling out in limited fashion. The card becomes available to all iPhone owners in the United States toward the end of August. According to CEO Tim Cook, a random selection of people who signed up to be notified …

Ransomware Now Sends Malicious Texts Through Mobile Device

If you own an Android device, there’s a new threat to be at least moderately concerned about.  It takes the form of a new ransomware family that spreads from one victim to the next with text messages that contain poisoned links to every contact on an infected device. The ESET …

Playing Videos Could Allow Hackers Into Your Phone

Do you have an Android device?  Are you running Android Nougat, Oreo, or Pie (versions 7x, 8x, or 9x)?  Do you play games on your phone? If you answered yes to those questions, you may have a problem. It is a bigger problem given that there are more than a …

Security Flaw Found In Open Source Office Program LibreOffice

Do you use LibreOffice? It’s an open source clone that’s functionally similar to Microsoft Office that has grown quite popular over the years. It is available for Windows, macOS and Linux systems. While open-source software solutions generally have the reputation of being safer and more secure, they’re not immune to …