Skip to main content
  1. Home
  2. Cybersecurity

Cybersecurity

GPS map data from an Apple Watch Ultra and the Apple Watch Series 8 shown on an iPhone 14 Pro and iPhone SE 2022.

Why GPS is critical to your smartphone — and desperately needs an overhaul

You probably use GPS on your phone every single day. The tech is important, highly flexible, and very prone to cybersecurity attacks.
padlock on keyboard.

Hacker ranks explode — here’s how you can protect yourself

Microsoft's Digital Defense report warns of a wave of new hackers and cybersecurity threats and tells you how to stop them.
a faceless hacker in a black hoodie in front of a computer screen with lines of code on it.

Hackers sink to new low by stealing Discord accounts in ransomware attacks

AXLocker is a new ransomware attack that not only encrypts your files -- it also attempts to steal your Discord account, giving you 48 hours to respond.
The power key on the side of the iPhone 14 Plus.

Your iPhone may be collecting more personal data than you realize

How secure is your iPhone? According to security researchers, it may be collecting more personal information than you think.
Google Chrome icon in mac dock.

Half of Google Chrome extensions may be collecting your personal data

Data risk management company Incogni has found that half of every installed Google Chrome extension have a high to very high risk of collecting personal data.
Person sitting and using an HP computer with Windows 11.

Update Windows now — Microsoft just fixed several dangerous exploits

Microsoft has just fixed a whole lot of dangerous vulnerabilities as part of its latest Windows patch.
A depiction of a hacker breaking into a system via the use of code.

This Chrome extension lets hackers remotely seize your PC

Malicious extensions on Google Chrome are being used by hackers remotely in an effort to steal sensitive information.
Professor Ali Abedi flying Wi-Peep standing against brick wall.

This Wi-Fi security flaw could let drones track devices through walls

A research team from University of Waterloo has attached a device to a drone that can uses vulnerabilities in Wi-Fi networks to see through walls.
A black fedora rests on top of newspapers infected with spreading green lines..

Hackers are infiltrating news websites to spread malware

The latest cybersecurity attack takes advantage of your trust in news sites and your browser to trick you into downloading malware.
Apple Seurity Research website has resources for bug bounty hunters.

Apple Security Research website launches to protect your Mac

Apple is making it easier to research security flaws in macOS and iOS with its new website, which also serves as a reporting hub and information resource.
Nvidia GeForce RTX 4090 GPU.

Here’s how much faster Nvidia’s RTX 4090 is at cracking passwords

You need to start using 2FA and a password manager since the latest research shows how much faster Nvidia’s RTX 4090 is at cracking passwords.
A faceless hooded hacker busily types on a laptop.

Typos can get you hacked in latest cybersecurity threat

Fake websites look just like the real ones, but steal your logins, harvest cryptocurrency, and infect your computer and phone in the latest cybersecurity threat.
A gaming laptop with the ReSpec brand over it.

Are Windows 11 security features killing your gaming performance? You might be surprised

Windows 11's security features kill your gaming performance, right? Microsoft brought this year-old issue back up, and we think it is high time to revisit it.
A person using 1Password on a MacBook.

Passwords are hard and people are lazy, new report shows

Survey finds that online security is too difficult and most of us simply won't bother with multiple,strong and unique passwords.
Dashlane password manager for better security.

Dashlane will secure and change your online experiences for the better

Dashlane is a password manager and online companion that completely changes how you log in to accounts and secure data. It's for individuals and businesses.
A depiction of a hacker breaking into a system via the use of code.

Microsoft data breach exposed sensitive data of 65,000 companies

Microsoft is in a disagreement with a security research firm regarding how a recent breach of its servers has been handled.
DuckDuckGo is a privacy-first web browser.

DuckDuckGo’s new browser could help keep Mac users safe on the web

DuckDuckGo's privacy-first web browser has moved from the iPhone to the Mac and it might have even more security and safety than Apple's Safari.
A symbol of the Mozilla Firefox logo.

The latest Firefox release redesigns its private browsing feature

Mozilla shows off its Private Browsing mode updates and design makeovers for Cybersecurity month.
Microsoft Defender SmartScreen helps protect users against websites that engage in phishing and malware campaigns.

Microsoft Edge now warns when your typos can lead to being phished

Microsoft has added a new feature to its Defender SmartScreen service to protect users from landing on typo webpages that might be phishing scams.
Facebook logo appears with a hooded figure over a cracked blue background.

This new malware is targeting Facebook accounts – make sure yours is safe

Ducktail malware started as a threat to only Facebook Business accounts, but now everyone is in danger. Here's what you need to know to protect your account.
Google passkeys on Android

Google wants to kill your passwords on Android and Chrome with passkeys

Google shared its plans to launch passkeys and make insecure passwords a thing of the pass as part of an industrywide initiative.
Microsoft Security logo appears in the corner of a scene with IT workers at computers

Microsoft just gave you a great way to fight Windows brute-force attacks

Windows is about to become more secure with a recent update from Microsoft that should block a large number of brute-force hacking attempts.
The CommonSpirit Health’s logo appears over the silhouette of a hacker.

As ransomware hits this U.S. hospital, lives could be at risk

One of the nation’s largest hospital chains is suffering from a ransomware attack taking computer records offline for nine days, while patients wait.
Woman Checking Her Email

New COVID-19 phishing emails may steal your business secrets

Google Forms are being used by cybercriminals as a way to obtain sensitive information of business owners through COVID-19 phishing emails.
Computer user touching on Microsoft Word icon to open the program.

This dangerous new hacker tool makes phishing worryingly easy

Setting up phishing campaigns for Microsoft 365 has become a relatively straightforward process due to a phishing-as-a-service (PhaaS) platform named Caffeine.
An Intel Alder Lake Core i5-12600K CPU and its packaging.

Intel Alder Lake BIOS source code was leaked — should you be worried?

Intel has confirmed that the source code for the Alder Lake BIOS was leaked. What will the consequences be?
A depiction of a hacker breaking into a system via the use of code.

Over 1M credit cards just leaked to criminals on the dark web

Over 1.2 million credit cards have been distributed via the dark web through a recently launched underground marketplace.
Social media mobile apps on a smartphone screen, all on a textured gray fabric background.

Meta found over 400 mobile apps ‘designed to steal’ Facebook logins

Meta has published a report detailing its discovery of over 400 mobile apps that were created to steal Facebook users' login information.
Google Chrome logo appears over photo of laptop with chart of vulnerabilities.

Google Chrome tops this list of most vulnerable browsers

Google Chrome suffered more vulnerabilities than any other browser in 2022 -- and it wasn't even close -- while a little-known browser had zero.
A depiction of a hacker breaking into a system via the use of code.

Hackers have found a way to hack you that you’d never expect

A security flaw has allowed a ransomware gang to effectively prevent antivirus programs from running properly on a system.
A Dell laptop connected to a hard drive on a couch.

A new phishing scam pretends to be your boss sending you an email

A business email compromise campaign deceives a company employee into thinking their boss is authorizing a payment, but it's actually a bad actor.
A MacBook with Google Chrome loaded.

New phishing method looks just like the real thing, but it steals your passwords

This new phishing method could make it possible for hackers to steal important data by cloning a trustworthy website or app in Application Mode.
norton 360 deluxe with lifelock deal best buy december 2021 shutterstock antivirus

This dangerous vulnerability tricks researchers by mimicking old threats

The CVE-2022-41040 and CVE-2022-41082 zero-day flaw has been brought to Microsoft's attention after its Exchange email servers were left exposed to bad actors.
A depiction of a hacker breaking into a system via the use of code.

North Korean hackers create fake job offers to steal important data

Microsoft has found that North Korea-based hackers have been using various software and creating fake jobs to carry out malicious cyberattacks.