New Security Vulnerability Affects Current Mac OS Users
22-February-2021
Not long ago, a critical flaw in Linux SUDO was discovered and is being tracked as CVE-2021-3156.
Given the nickname “Baron Samedit,” it’s a flaw in a Unix program that…
22-February-2021
Not long ago, a critical flaw in Linux SUDO was discovered and is being tracked as CVE-2021-3156.
Given the nickname “Baron Samedit,” it’s a flaw in a Unix program that…
17-February-2021
The year 2017 was an eternity ago in internet time, but back in those ancient days, there was one name in the ransomware world that sent tremors of terror…
05-February-2021
If you do any photo editing online, odds are good that you use PIXLR. It is one of the most popular such sites on the web because it offers…
01-February-2021
While Google has come under fire from privacy groups in recent months, the fact remains that on balance, the company is working hard to improve overall user experience on…
29-January-2021
Security researchers at Check Point have recently identified a new strain of malware that seems to be a Frankenstein’s Monster created by combining two older strains.
Dubbed ‘Rogue RAT,’ this…
22-January-2021
At CES 2021, arguably the most influential and significant tech event in the world, Intel made an important announcement regarding its historic eleventh generation of chips.
The latest designs will…
18-January-2021
Hackers and scammers have hit the ground running in 2021, launching an extensive new phishing campaign that targets the legions of PayPal users around the world. The campaign is…
13-January-2021
There’s a new worm making the rounds on Windows and Linux-based servers that you should be aware of. This nasty bit of code has been spreading rapidly, using simple…
11-January-2021
In 2020, there have been a number of high-profile data breaches, and as we move closer to the end of the year, we have yet another to report.
This time,…
08-January-2021
Various hackers around the world have found a new hobby. Recently, there has been a rise in “Swatting Attacks”, which have seen hackers take advantage of the notoriously weak…