Google recently found itself in hot water with corporate IT administrators for rolling out a feature designed to help prolong battery life. The new feature accomplished its mission, but it had an unintended consequence that left Enterprise IT personnel furious. The feature is called “WebContent Occlusion,” and the idea is …
Android Devices Using Qualcomm Chips Can Be Hacked
Do you have an Android device? Is it built around a Qualcomm chipset? If so, be advised that you may be at risk. According to a report recently published by security firm CheckPoint, a recently discovered flaw could allow hackers to steal a variety of sensitive information on your phone …
Public Chargers Can Expose Your Device To Hacking And Malware
On paper, it seems like a lovely idea to use a public charger. Airports, hotels, and other high traffic areas have begun to increasingly offer public USB power charging stations to give people a convenient means of recharging their favorite devices. Unfortunately, things are not working out quite according to …
Hackers Are Imitating Government Agencies To Spread Malware
Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian Revenue Agency, the German Federal Ministry of Finance, and the United States Postal Service. This is all part …
Another WhatsApp Vulnerability Has Been Found
WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it’s got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no end of troubles as a raft of vulnerabilities have been exposed and exploited by hackers from every corner …
Racoon Stealer Malware Is New One To Watch For
There is a new form of malware that you and your staff need to be aware of. That’s because it’s gaining in popularity among cyber criminals around the world. Known as ‘Racoon Stealer,’ it is noteworthy not for its complexity but rather, for its extreme ease of use. Worse, the …
Fake Voicemail Messages Tricking People Into Opening Malicious Content
Office 365 has been the target of an increasing number of ongoing phishing scams. The latest scam involves using fake voicemail messages to convince targets that they need to log in to hear the full recording. Researchers at McAfee Labs had this to say about the matter: “Over the past …
Popular Web Domain Registrar Hit With Data Breach
Do you have web domains registered with Web.com, Network Solutions or Register.com? If so, at least some of your data may have been compromised. Web.com recently reported that they and their two subsidiaries named above were breached by an unknown third party. The breach occurred in late August 2019 and …
Non-Updated Android Phones Vulnerable To NFC Beaming Hacks
Has it been more than a month since you upgraded your Android OS? If so, you should make upgrading a priority. Just over a month ago, Google patched a critical flaw in the Android OS that allowed hackers to “beam” malware to any unpatched devices via a process called ‘NFC …
Google Chrome Users Should Update Immediately
If you’re using Google’s Chrome browser to read this article, be advised that the company has announced the presence of a pair of major, Zero-Day vulnerabilities that put you at immediate risk. Not only are the flaws of the highest possible severity, but hackers have already begun exploiting them. The two …