Google Is Bringing Back Chrome’s Close Other Tabs Option

Not long ago, Google decided to remove the “Close Other Tabs” option from the right click context menu of their browser. While its removal didn’t exactly cause an uproar among Chrome’s massive user base, the move was greeted with confusion and resignation. It was after all a good, handy feature. …

Discord Users Be Careful Of Malware And Information Theft

Do you use the Discord chat service? If so, be advised that malware developers have been using the service to not only host various types of malware, but also to use it as a command and control server. In addition, they are abusing the chat client to force it to …

Some iOS Apps Found To Have Clicker Trojan Malware

Recently, a survey of Apple’s App Store by Wandera Threat Lab discovered more than a dozen iOS apps that have been infected with the ‘Clicker’ Trojan malware.  As malware goes, this variant isn’t especially dangerous to those who wind up infected with it, but it’s still problematic. A spokesman for …

Netflix May Stop Allowing Users To Share Their Passwords

Do you have a Netflix account? If so, you know how awesome the service is.  Intuitive and easy to use, and of special interest, easy to share. In fact, password sharing among family and friends is so common that it’s even openly discussed on discussion forums around the web. Unfortunately, …

Malware Takes Down Services At Popular Billing Company

Billtust is major player in the US financial services sector that provides a variety of billing and payment processing services for some of the biggest financial institutions in the nation. On October 17th, they suffered a malware attack that brought all of their services to a grinding halt. Unfortunately, the …

New Office 365 Feature May Prevent Questionable Emails

Microsoft continues their war against spam and phishing emails with the rollout of a new feature in Office 365 called ‘Unverified Sender’. It is designed to help Outlook users identify emails that may contain poisoned files or requests for personal or sensitive information that could be used to steal a …

Backdoor Could Be Used On Microsoft SQL Without Detection

If you haven’t heard of Skip-2.0 yet, prepare to be dismayed. Security researchers have recently discovered an undocumented (until now) backdoor designed for Microsoft SQL servers. It will allow a hacker working remotely to stealthily take control of a previously compromised system. Worse, this is not theory or conjecture.  Researchers …

New Server Data Breach Reported at NordVPN

NordVPN provides a popular Virtual Private Network (VPN) service used by clients around the world. Unfortunately, they recently disclosed that a server in one of their data centers was breached back in March of 2018. According to the details released, the server was located in a data center in Finland. …

Are Hackers Using Popular Assistant Devices To Listen To Users?

The utility of virtual assistants like Amazon’s Alexa and Google Home are undeniable.  They’re just genuinely handy devices to have around. Unfortunately, they’re also prone to abuse and exploits by hackers and unsavory developers. They can be used to spy on and even steal sensitive information from unsuspecting users. This …

Tamper Protection Enabled By Default In Windows 10 Update

Do you have the new Windows 10? If you’re not sure, the most recent version (as of the time this article was written) is version 1903, which was the May 2019 update. Assuming you’ve got that version or later, you should have Microsoft’s Tamper Protection enabled by default. If you’re …