Do you have an Android device? Are you running Android Nougat, Oreo, or Pie (versions 7x, 8x, or 9x)? Do you play games on your phone? If you answered yes to those questions, you may have a problem. It is a bigger problem given that there are more than a …
Security Flaw Found In Open Source Office Program LibreOffice
Do you use LibreOffice? It’s an open source clone that’s functionally similar to Microsoft Office that has grown quite popular over the years. It is available for Windows, macOS and Linux systems. While open-source software solutions generally have the reputation of being safer and more secure, they’re not immune to …
Equifax Breach Victims Could Be Entitled To Settlement Claims
Equifax is one of the three credit reporting firms in the US that suffered a massive data breach in 2017 that exposed the personal and financial state of literally half the country (more than 150 million people). As a result, Equifax was ordered to pay a hefty $700 million fine …
Update iPhone to Avoid Possible iMessage Bug
People like and tend to gravitate to Apple products because the company has gone to great lengths to make their products are highly secure. Sure, you pay more for them, but most people justify the added expense because a) they look better and are better designed than competing products and …
New Ransomware Targets Network Attached Storage Devices
Yet another new ransomware family has been found in the wild, discovered independently by researchers at two separate security firms, Anomail and Intezer. The new strain has been dubbed “QNPCrypt” by Intezer and eCh0raix” by Anomail and is written in the Go programming language. When it encrypts files, it chances …
Some Android Apps To Receive Your Data Without Permission
When it works, Android’s app permissions are awesome. They’re straightforward and easy to understand. When you install a new app on your phone, you’ll get a popup box that gives you a summary of what permissions the app says it needs. Then, you have the option to either accept or …
New Phishing Scam Targets Your Amazon Account
McAfee researchers have discovered a new version of the 16Shop phishing kit in use by hackers around the world. According to the latest research, there are now more than 200 URLs currently being used by hackers to collect login information from Amazon customers. The methodology the hackers are using is …
Google Home Device Recordings May Not Be Private
Do you own a Google Home? If so, you probably find it to be indispensable. It’s a powerful, genuinely helpful piece of technology, but there’s a catch. It’s so good and so useful because it listens constantly for voice commands from you. Those commands get recorded. Recently, Google acknowledged that …
New Spyware Is Targeting WhatsApp Messages
Recently, Kaspersky Labs has identified a new strain of malware to be concerned about, and it is spreading across the internet. Called FinSpy, it specifically targets WhatsApp on both Android and iOS devices. An analysis of the code reveals that the spyware was created by a German company called Gamma …
Apple Turns Off Mac OS Feature For Security Concerns
Apple is in the news again, but not for anything good. Jonathan Leitschuh, a security researcher, recently unearthed a serious security flaw that allowed a hacker to activate a Mac computer’s webcam without alerting the computer’s owner. The problem is a program called Zoom. The Zoom software installs a web …