Not long ago, Google decided to remove the “Close Other Tabs” option from the right click context menu of their browser. While its removal didn’t exactly cause an uproar among Chrome’s massive user base, the move was greeted with confusion and resignation. It was after all a good, handy feature. …
Discord Users Be Careful Of Malware And Information Theft
Do you use the Discord chat service? If so, be advised that malware developers have been using the service to not only host various types of malware, but also to use it as a command and control server. In addition, they are abusing the chat client to force it to …
Some iOS Apps Found To Have Clicker Trojan Malware
Recently, a survey of Apple’s App Store by Wandera Threat Lab discovered more than a dozen iOS apps that have been infected with the ‘Clicker’ Trojan malware. As malware goes, this variant isn’t especially dangerous to those who wind up infected with it, but it’s still problematic. A spokesman for …
Netflix May Stop Allowing Users To Share Their Passwords
Do you have a Netflix account? If so, you know how awesome the service is. Intuitive and easy to use, and of special interest, easy to share. In fact, password sharing among family and friends is so common that it’s even openly discussed on discussion forums around the web. Unfortunately, …
Malware Takes Down Services At Popular Billing Company
Billtust is major player in the US financial services sector that provides a variety of billing and payment processing services for some of the biggest financial institutions in the nation. On October 17th, they suffered a malware attack that brought all of their services to a grinding halt. Unfortunately, the …
New Office 365 Feature May Prevent Questionable Emails
Microsoft continues their war against spam and phishing emails with the rollout of a new feature in Office 365 called ‘Unverified Sender’. It is designed to help Outlook users identify emails that may contain poisoned files or requests for personal or sensitive information that could be used to steal a …
Backdoor Could Be Used On Microsoft SQL Without Detection
If you haven’t heard of Skip-2.0 yet, prepare to be dismayed. Security researchers have recently discovered an undocumented (until now) backdoor designed for Microsoft SQL servers. It will allow a hacker working remotely to stealthily take control of a previously compromised system. Worse, this is not theory or conjecture. Researchers …
New Server Data Breach Reported at NordVPN
NordVPN provides a popular Virtual Private Network (VPN) service used by clients around the world. Unfortunately, they recently disclosed that a server in one of their data centers was breached back in March of 2018. According to the details released, the server was located in a data center in Finland. …
Windows 10 Will Get Android Phone Call Integration Features
Microsoft may have given up on the idea of putting their Windows operating system on smartphones, but that doesn’t mean they’ve given up on smartphones altogether. Recently, the company announced a significant feature addition that will allow users to take calls made to an Android phone from their Windows-based PC. …
Are Hackers Using Popular Assistant Devices To Listen To Users?
The utility of virtual assistants like Amazon’s Alexa and Google Home are undeniable. They’re just genuinely handy devices to have around. Unfortunately, they’re also prone to abuse and exploits by hackers and unsavory developers. They can be used to spy on and even steal sensitive information from unsuspecting users. This …