Lenovo reports that it has patched two critical security flaws that affected several of its ThinkBook, IdeaPad, and Yoga laptops. Lenovo is also recommending that consumers update their systems immediately. The flaws make it possible for cybercriminals to deactivate the UEFI Secure Boot tool, allowing them to load and run …
DuckDuckGo Releases App Tracking Protection Beta for Android
The feature is comparable to Apple’s ‘App Tracking Transparency. However, unlike Apple, DuckDuckGo’s method does not rely on app developers’ compliance with user choice. All known trackers are blocked. According to DuckDuckGo, Android users have an average of 35 applications installed on their smartphones, resulting in between 1,000 and 2,000 …
Recent Growth of Fake LinkedIn Accounts
According to a KrebsOnSecurity article, the recent growth of phony LinkedIn accounts is causing an identity crisis for the business networking site and organizations that rely on it to hire and evaluate new workers. The fake LinkedIn profiles, created with content stolen from authentic accounts and AI-generated profile pictures, are …
Implementing SSO in Your Business
When you’re a business owner, you always look for ways to streamline processes and improve efficiency. A single sign-on (SSO) system is a great way to simplify authentication. It allows users to access multiple applications with just one login credential, saving them time and money as well as reducing the …
VoIP Features Enhance Customer Experience
There are many reasons why staff may be required to put customers on hold. However, Voice-over Internet Protocol (VoIP) technology can be utilized to ensure that callers do not feel abandoned during this time. In addition, VoIP systems offer the option of entertaining customers while they wait in line. Some …
The Rise of Encryption in Businesses
As our world becomes increasingly digitized, businesses are finding themselves at a greater risk of cyberattacks. One way companies can protect their data is by encrypting it. Encryption transforms readable data into an unreadable format, making it difficult for unauthorized individuals to access and interpret it. A recent survey conducted …
Hundreds of U.S. News Outlets Affected by Malware
A cyber-security threat actor known as SocGholish has compromised a JavaScript code used by an unnamed media content provider. The malware is being used to spread the FakeUpdates malware to major media outlets across the United States. More than 250 regional and national newspaper sites are affected by the malicious …
New Microsoft Report Details Latest Cybersecurity Threats
According to Microsoft’s latest announcement, businesses should assess security measures to defend against evolving cyber-security threats. Microsoft released its Digital Defense Report (MDDR) for 2022. Microsoft released alarming statistics about the cyber threats that the company has faced in the last year, including phishing, identity theft, and ransomware attacks. Microsoft …
Zoom Unveils New Productivity Tools
While holding its Zoomtopia event on November 8, 2022, the video conferencing giant announced the release of two brand-new productivity tools for Zoom users. In addition to the communication and collaboration tools already provided within Zoom, the newly released Zoom Mail and Calendar Clients are intended to increase users’ productivity. …
Attacks on Business VPNs are Increasing
Virtual private networks (VPNs) are used to give users remote access to resources on corporate networks. However, several factors have revealed incompatibilities between VPNs and Zero-Trust security systems. Businesses are worried that VPNs are becoming a severe threat to their operations. According to a report by Zscaler, nearly half of …