The malware named TrickBot has some new tricks up its sleeves. Recently, a new strain of the malware was spotted in the wild with new capabilities that allow it to target the Active Directory database stored on compromised Windows domain controllers. While TrickBot has never been seen as one of …
New IRS Tax Scammers Use Personal Data For Big Returns
Recently, the Department of Justice brought charges against Babatunde Olusegun Taiwo for using personal information acquired on the Dark Web. He used the information from data breaches to file fraudulent tax returns with the IRS. He was able to gain enough information to file more than two thousand income tax …
Microsoft Releasing New Chromium Based Edge Browser To Users
Microsoft Edge is dead. Long, live Microsoft Edge! The tech giant Microsoft has seen enormous success in a variety of markets, but it never could make a dent in Google’s dominance in the browser market. As of January 15th, 2020, it appears that the company has given up trying. The …
Messaging Gets Upgrade For Instagram Users
Mark Zuckerberg’s social media empire is chasing growth. It’s not hard to understand why. Facebook is the world’s largest social media platform, with more than 2.4 billion users worldwide. The bigger you get, the harder it is to grow. That is exactly why Zuckerberg zeroed in on the three fastest …
Wyze User Information Leaked Include Emails And Other Data
Wyze is one of the many manufacturers of consumer-grade smart devices. They recently confirmed that user data belonging to nearly two and a half million of its customers was exposed. The root cause of the exposure was traced back to an unsecured database connected for nearly a month to an …
Landrys Restaurant Chain Latest Victim Of Credit Card Breach
If you’re not familiar with Landry’s, you’re probably familiar with at least some of the restaurants the company owns. The company recently issued a formal ‘Notification of Data Breach’ in which they disclosed that an unauthorized user was detected on their systems and that POS malware had been used between …
New Hacking Method Looks Like A Locked Computer
Scammers have breathed new life into an old scam. For years, the old ‘Law Enforcement Lock’ trick has been used to cheat unsuspecting victims of their hard-earned money. The new wrinkle works like this: Scammers will redirect users using the Chrome web browser to sites that host a full-screen image …
Message Recall Feature May Be Added To Office 365
For a while now, Microsoft Outlook users have enjoyed a highly popular addition to their email service. In a nutshell, it allows them to recall messages that have been sent using Outlook, which is an Exchange Online hosted cloud email service for business. They can un-send the emails, provided that …
ISO Files Are Being Used To Deliver Malware
Researchers at Trustwave have observed a notable increase in the use of .ISO files to deliver malware. Hackers have relied on poisoned disk image files for years to deliver malware to their targets. It makes sense in a Windows environment because it allows attackers to disguise their payloads as an …
Kids Can Bypass Communication Limit Feature On iOS 13.3
If you have children that own Apple devices, be aware that the latest update for iOS 13.3 included a feature called Communications Limits. It is designed to allow parents to set up parental controls to keep their kids from speaking to, texting with, or Facetiming with anyone who’s not already …