Security & Privacy

January 20, 2020

Hackers’ Newest Trick Hides Ransomware While It Encrypts Victims’ Files

A ransomware variant known as Snatch is now more dangerous than ever. Learn about the newest trick that cybercriminals are using to make this ransomware harder […]
January 6, 2020

Flaws in Qualcomm Chipsets Are Leaving Android Devices Vulnerable

The Qualcomm chipsets in many Android smartphones have vulnerabilities that could let cybercriminals gain access to passwords and other highly sensitive data stored in the devices. […]
December 30, 2019

How to Use Your Laptop’s Bluetooth Connection Securely

Using Bluetooth to connect devices to your laptop is convenient but also risky. Discover what those risks are and how to minimize them. Many laptops come […]
December 23, 2019

6 Things to Consider When Choosing an Anti-Spyware App

Cybercriminals use spyware to record keystrokes, copy files, read emails and much more. One of the best ways to keep spyware off your devices is to […]
December 12, 2019

Two New, Unconventional Ransomware Programs Might Be Coming Your Way

Two new ransomware variants — AnteFrigus and PureLocker — made the rounds in November 2019. Learn why these programs caught the attention of security experts. Although […]
December 9, 2019

Online Holiday Scams & How to Protect Your Data

December is the busiest shopping month of the year with several gift giving holidays within. Companies send out more email volume during this time to past […]
November 18, 2019

Using Galaxy S10 or Note10? Be Sure to Install the Biometric Update

The Galaxy S10, S10+, S10 5G, Note10, and Note10+ smartphones have a flaw that allows any fingerprint to unlock the devices when certain screen protectors are […]
November 14, 2019

CCleaner: A Tale of Two Attacks

CCleaner has been the target of hackers twice in the last three years. Here are several lessons that you can learn from these attacks. CCleaner — […]
October 28, 2019

5 Things You Should Know about Phishing

The more you know about phishing, the better you will be able to spot phishing attacks. Here are five phishing fundamentals that can help you avoid […]