Using “Unsubscribe” links might seem like a good way to prevent junk emails from cluttering your inbox but doing so is risky. Here are four reasons […]
AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what […]
Microsoft apps such as Word, Edge, and Outlook are a business mainstay. When using these apps, employees can take advantage of keyboard shortcuts to save time. […]
The U.S. National Security Agency (NSA) recently published a list of the top publicly known vulnerabilities Chinese state-sponsored hackers exploit, several of which affect Microsoft and […]
Linux OS is perceived to have fewer security vulnerabilities than systems like Windows. However, that doesn’t mean users shouldn’t remain alert to the threat of Drovorub […]
WordPress sites running the File Manager plugin are being hounded by hackers, thanks to a critical vulnerability found in some of the plugin versions. Find out […]
A critical vulnerability in the Microsoft Netlogon Remote Protocol is leaving some companies open to attack. Here is what you need to know to determine if […]
Smishing, vishing, and whaling might sound ominous, but they are simply terms used to describe different types of phishing attacks. Find out how these attacks differ […]