March 21, 2022

A Leak has been Detected in Safari 15

Safari 15 implements the IndexedDB API, which introduces a data leak that allows websites to track the user’s internet activity and disclose their identity. FingerprintJS reported […]
March 14, 2022

That QR Code Could be a Malware Program

Quick Response (QR) codes have become a standard method of conducting contactless transactions during the COVID-19 pandemic. However, cyber criminals are exploiting the lax security that […]
February 10, 2022

US Government Launches “Hack DHS” Bug Bounty Program

The Department of Homeland Security (DHS) announced the launch of the “Hack DHS” bug bounty program on December 14, 2021. The purpose of this program is […]
January 31, 2022

Dridex is sending out Termination Letters, Fake Covid Funerals

The latest Dridex phishing campaign has been using various hot topics to lure its victims, including COVID-19 funeral assistance and employee termination letters. Regardless of the […]
November 22, 2021

Beware of QR Code Scams

Businesses use Quick Response (QR) codes to provide a variety of services for their customers, such as locating apps for ordering a product and tracking shipments. […]
October 28, 2021

China’s New Data Policy & What It Means

China enacted the Personal Information Protection Law (PIPL) on August 21, 2021 as part of that country’s growing scrutiny of its high tech sector. This law […]
October 18, 2021

That Text Message you Received is Smishing

You may have been the victim of an SMS-based phishing, or smishing, attack if you’ve ever received a text message that claimed there was a problem […]
October 7, 2021

Why Does T-Mobile Keep Getting Hacked?

Hackers have stolen the personal data of millions of T-Mobile’s customers, according to a blog post from CEO Mike Sievert on August 27, 2021. The data […]
October 4, 2021

T-Mobile Breach Exposed the Personal Data of 54 Million Customers

The T-Mobile data breach in August 2021 was massive. Find out what data was stolen, what T-Mobile is doing to help customers affected by the breach, […]