Skip to main content

Software

a faceless hacker in a black hoodie in front of a computer screen with lines of code on it

Hackers sink to new low by stealing Discord accounts in ransomware attacks

AXLocker is a new ransomware attack that not only encrypts your files -- it also attempts to steal your Discord account, giving you 48 hours to respond.
A pair of glasses rests on a desk in front of multiple computer monitors filled with code.

Beware — even Mac open-source apps can contain malware

Your Mac isn't completely immune to hackers so watch out for this sneaky malware threat that pretends to be a helpful open-source app.
Google Chrome icon in mac dock.

Half of Google Chrome extensions may be collecting your personal data

Data risk management company Incogni has found that half of every installed Google Chrome extension have a high to very high risk of collecting personal data.
Person sitting and using an HP computer with Windows 11.

Update Windows now — Microsoft just fixed several dangerous exploits

Microsoft has just fixed a whole lot of dangerous vulnerabilities as part of its latest Windows patch.
A depiction of a hacker breaking into a system via the use of code.

This Chrome extension lets hackers remotely seize your PC

Malicious extensions on Google Chrome are being used by hackers remotely in an effort to steal sensitive information.
Professor Ali Abedi flying Wi-Peep standing against brick wall.

This Wi-Fi security flaw could let drones track devices through walls

A research team from University of Waterloo has attached a device to a drone that can uses vulnerabilities in Wi-Fi networks to see through walls.
A black fedora rests on top of newspapers infected with spreading green lines..

Hackers are infiltrating news websites to spread malware

The latest cybersecurity attack takes advantage of your trust in news sites and your browser to trick you into downloading malware.
The Rewind app on an iMac with a pink background, showing a grid of faces from a Zoom call

This creepy Mac app can record every moment of your online life

A new app for your Mac claims it can record every moment of your online life and store it for retrieval.
Apple Seurity Research website has resources for bug bounty hunters.

Apple Security Research website launches to protect your Mac

Apple is making it easier to research security flaws in macOS and iOS with its new website, which also serves as a reporting hub and information resource.
Nvidia GeForce RTX 4090 GPU.

Here’s how much faster Nvidia’s RTX 4090 is at cracking passwords

You need to start using 2FA and a password manager since the latest research shows how much faster Nvidia’s RTX 4090 is at cracking passwords.
A faceless hooded hacker busily types on a laptop.

Typos can get you hacked in latest cybersecurity threat

Fake websites look just like the real ones, but steal your logins, harvest cryptocurrency, and infect your computer and phone in the latest cybersecurity threat.
A gaming laptop with the ReSpec brand over it.

Are Windows 11 security features killing your gaming performance? You might be surprised

Windows 11's security features kill your gaming performance, right? Microsoft brought this year-old issue back up, and we think it is high time to revisit it.
Mac privacy tips: 1Password

Passwords are hard and people are lazy, new report shows

Survey finds that online security is too difficult and most of us simply won't bother with multiple,strong and unique passwords.
A depiction of a hacker breaking into a system via the use of code.

Microsoft data breach exposed sensitive data of 65,000 companies

Microsoft is in a disagreement with a security research firm regarding how a recent breach of its servers has been handled.
DuckDuckGo is a privacy-first web browser.

DuckDuckGo’s new browser could help keep Mac users safe on the web

DuckDuckGo's privacy-first web browser has moved from the iPhone to the Mac and it might have even more security and safety than Apple's Safari.
A symbol of the Mozilla Firefox logo.

The latest Firefox release redesigns its private browsing feature

Mozilla shows off its Private Browsing mode updates and design makeovers for Cybersecurity month.
Microsoft Defender SmartScreen helps protect users against websites that engage in phishing and malware campaigns.

Microsoft Edge now warns when your typos can lead to being phished

Microsoft has added a new feature to its Defender SmartScreen service to protect users from landing on typo webpages that might be phishing scams.
Facebook logo appears with a hooded figure over a cracked blue background.

This new malware is targeting Facebook accounts – make sure yours is safe

Ducktail malware started as a threat to only Facebook Business accounts, but now everyone is in danger. Here's what you need to know to protect your account.
Microsoft Security logo appears in the corner of a scene with IT workers at computers

Microsoft just gave you a great way to fight Windows brute-force attacks

Windows is about to become more secure with a recent update from Microsoft that should block a large number of brute-force hacking attempts.
The CommonSpirit Health’s logo appears over the silhouette of a hacker.

As ransomware hits this U.S. hospital, lives could be at risk

One of the nation’s largest hospital chains is suffering from a ransomware attack taking computer records offline for nine days, while patients wait.
Woman Checking Her Email

New COVID-19 phishing emails may steal your business secrets

Google Forms are being used by cybercriminals as a way to obtain sensitive information of business owners through COVID-19 phishing emails.
NordVPN company name and logo, blue mountain peaks against a white circle on a blue background.

Is there a NordVPN Prime Day deal?

If you're looking for a great online suite, the NordVPN Complete package is 64% off and comes with three free months. Grab it before October Prime Day is over!
Computer user touching on Microsoft word icon to open the program.

This dangerous new hacker tool makes phishing worryingly easy

Setting up phishing campaigns for Microsoft 365 has become a relatively straightforward process due to a phishing-as-a-service (PhaaS) platform named Caffeine.
An Intel Alder Lake Core i5-12600K CPU and its packaging.

Intel Alder Lake BIOS source code was leaked — should you be worried?

Intel has confirmed that the source code for the Alder Lake BIOS was leaked. What will the consequences be?
A depiction of a hacker breaking into a system via the use of code.

Over 1M credit cards just leaked to criminals on the dark web

Over 1.2 million credit cards have been distributed via the dark web through a recently launched underground marketplace.
Social media mobile apps on a smartphone screen, all on a textured gray fabric background.

Meta found over 400 mobile apps ‘designed to steal’ Facebook logins

Meta has published a report detailing its discovery of over 400 mobile apps that were created to steal Facebook users' login information.
Google Chrome logo appears over photo of laptop with chart of vulnerabilities.

Google Chrome tops this list of most vulnerable browsers

Google Chrome suffered more vulnerabilities than any other browser in 2022 -- and it wasn't even close -- while a little-known browser had zero.
A depiction of a hacker breaking into a system via the use of code.

Hackers have found a way to hack you that you’d never expect

A security flaw has allowed a ransomware gang to effectively prevent antivirus programs from running properly on a system.
how to back up emails in outlook laptop

A new phishing scam pretends to be your boss sending you an email

A business email compromise campaign deceives a company employee into thinking their boss is authorizing a payment, but it's actually a bad actor.
A MacBook with Google Chrome loaded.

New phishing method looks just like the real thing, but it steals your passwords

This new phishing method could make it possible for hackers to steal important data by cloning a trustworthy website or app in Application Mode.
norton 360 deluxe with lifelock deal best buy december 2021 shutterstock antivirus

This dangerous vulnerability tricks researchers by mimicking old threats

The CVE-2022-41040 and CVE-2022-41082 zero-day flaw has been brought to Microsoft's attention after its Exchange email servers were left exposed to bad actors.
Example of Teams chat.

How to create a new team in Microsoft Teams

Microsoft Teams allows you to organize your group based on different teams for different projects. Here's how to create and customize those Teams quickly!
A depiction of a hacker breaking into a system via the use of code.

North Korean hackers create fake job offers to steal important data

Microsoft has found that North Korea-based hackers have been using various software and creating fake jobs to carry out malicious cyberattacks.
Close-up of hands on a laptop keyboard in a dark room.

This dangerous hacking tool is now on the loose, and the consequences could be huge

A dangerous hacking tool has just been cracked and is now spreading quickly, potentially putting countless people at risk.