Hackers have recently hit upon a new money-making scheme. Some groups have started breaking into Instagram accounts belonging to people with high numbers of followers. They are then holding those accounts hostage until the owner agrees to pay the ransom. In some cases, the hackers are charging as much as …
Dark Herring Subscription Scam Affected Millions Of Android Users
Google partner Zimperium zLabs has recently discovered a sophisticated scam targeting more than 100 million Android users. The scam has been in operation right under Google’s nose for nearly two years. The scam has now been shut down by Google but while it was in operation, it spanned some 470 …
10 Facts About the Benefits of Security Awareness Training
Are you looking for an affordable, effective way to protect your company from cyberattacks and prevent a data breach? In today’s volatile cyberattack landscape, every business in every industry is at risk of a cyberattack. That means that every business needs to make sure that it’s taking a strong defensive …
Apple Released A Fix For Multiple Zero Day Exploits
There’s good news for Apple users. The company has been busy and has recently released security updates that address two Zero-Day vulnerabilities. These are security flaws that could be exploited by hackers to cause no end of trouble to anybody running macOS or iOS. The first Zero-Day addressed is being …
E-Mail From Department Of Labor Could Be Phishing Attack
There is a new phishing campaign to keep a watchful eye on according to email security firm INKY. It’s a particularly fiendish one. The attackers have designed an email template that does an admirable job of imitating the look and feel of emails sent from the US Department of Labor. …
Vulnerability In This Cisco Software Could Allow Hackers Access
Cisco recently discovered a critical security flaw in their Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS. The vulnerability allowed an attacker to execute code arbitrarily and gain root-level access on any device suffering from the vulnerability which is being tracked as CVE-2022-20649. The good news is that Cisco responded …
This Plugin Could Put Your WordPress Site At Risk
The WP HTML Mail plugin has been installed on more than 20,000 websites. If you’ve built a WordPress site for your business and you use that plugin, be aware that you are at risk. A high severity security flaw was recently discovered in the plugin that could allow an attacker …
Support Comes To An End For iOS 14 For iPhone Devices
When Apple first released iOS 15 they posted a promise on their website. That promise was: “If you’re using iOS or iPadOS 14.5 or later, you might now see the option to choose between two software update versions. This option allows you to choose between updating to the latest version …
Top 10 Brands That Phishing Attackers Use To Scam Users
Scammers delight in impersonating government agencies and well-known brands to lure email recipients into giving up their personal information. That information is then either exploited directly or sold to the highest bidder on the Dark Web. Have you ever wondered which agencies, companies or brands are the most imitated by …
Apple Safari Bug May Leak Personal Information And History
There was a recently discovered issue with the way the IndexedDB API was implemented in Safari’s WebKit engine. This is giving IT professionals who work in an environment dominated by Apple products heartburn. The faulty implementation allows or could allow an attacker to intercept leaking browser activity in real time …