New Malware Is Using CSV Files To Infect Users
Researchers have spotted a new phishing campaign you should be aware of. What sets this one apart is that the hackers are using a lowly but specially crafted CSV file to infect ...
Researchers have spotted a new phishing campaign you should be aware of. What sets this one apart is that the hackers are using a lowly but specially crafted CSV file to infect ...
An increasing number of scammers are using social media to target victims and relying on social engineering tricks to convince people to part with their personal information or money. The problem has ...
In late 2020 a new strain of malware called UpdateAgent appeared and began infecting Mac users. Initially the strain wasn't all that worrisome. It stole system information but it was by no ...
Back in September of 2020 Microsoft announced that it was experimenting with the addition of SMTP MTA Strict Transport Security (MTA-STS) support to Exchange Online. This was done in a bid to ...
Hackers have recently hit upon a new money-making scheme. Some groups have started breaking into Instagram accounts belonging to people with high numbers of followers. They are then holding those accounts hostage ...
There is a new phishing campaign to keep a watchful eye on according to email security firm INKY. It's a particularly fiendish one. The attackers have designed an email template that does ...
Cisco recently discovered a critical security flaw in their Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS. The vulnerability allowed an attacker to execute code arbitrarily and gain root-level access on any ...
The WP HTML Mail plugin has been installed on more than 20,000 websites. If you've built a WordPress site for your business and you use that plugin, be aware that you are ...
When Apple first released iOS 15 they posted a promise on their website. That promise was: "If you're using iOS or iPadOS 14.5 or later, you might now see the option to ...
Scammers delight in impersonating government agencies and well-known brands to lure email recipients into giving up their personal information. That information is then either exploited directly or sold to the highest bidder ...