There is no doubt that Zoom has become very popular in the business and academic sectors, as it is widely used for video conferencing and voice-over IP (VoIP). Zoom issued a...
Blog
The Evolution of Callback Phishing Scams
Phishing is one of the oldest forms of cybercrime. It continues to grow and evolve, making it difficult for people to defend themselves. Callback phishing scams are email...
DuckDuckGo for Mac Comes with New Privacy Features
DuckDuckGo announced on October 18, 2022, that the beta version of its Mac desktop app is now available for all Mac users. DuckDuckGo is a browser that focuses on privacy. It...
Ducktail Malware Returns With New PHP Variant
An advanced PHP variant of the Ducktail malware poses a risk to Facebook users. On October 13th, 2022, ZScaler, a cloud security firm, published a blog post detailing this latest...
DDoS IP Protection: A New, Low-Cost Option for SMB
Microsoft announced the Azure DDoS IP Protection released as a public preview on October 19, 2022. Small and medium-sized businesses (SMBs) can now benefit from DDoS protection...
Common Mistakes To Avoid When Implementing A CRM For Your Business
In order to be successful, it is important for businesses to have a good customer relationship management system in place. However, many small companies make simple mistakes that...
Fortinet Security Updates
Fortinet addressed a critical vulnerability that gave remote access to numerous services and was being exploited by threat actors in the wild. The company described the...
Toyota T-Connect Database Exposed
On October 7, 2022, Toyota Motor Corporation made an announcement that the personal information of approximately 296,000 consumers had been compromised. The Toyota T-Connect...
Firefox 106 Update: What’s New and Improved
On October 18, 2022, Firefox 106 Stable and Firefox 102.4 ESR were released to the public. New features A new Colorways theme, Firefox view, PDF editing, text recognition, and...
Personal Information Compromised in City of Tucson Data Breach
In light of a recent data breach, the City of Tucson, Arizona, is alerting approximately 123,000 citizens that their personal information has been compromised. The issue was...
Akamai Finds 13 Million Malicious Domains Each Month
According to a new Akamai analysis, the company's experts classified about 79 million domains as dangerous in the first half of 2022; based on a NOD (newly observed domain)...
Lyft and Argo Bring Autonomous Vehicle Rides to Austin
Lyft is now launching autonomous robotaxi trips in Austin, Texas. Argo AI will power Ford's autonomous driving vehicles. According to a blog post by the company, Austin users can...
Intel Confirms Leak of Alder Lake BIOS Source Code
After a source code leak was posted by an unidentified third party on 4chan and GitHub last week, the technology giant Intel has confirmed that confidential source code related...
New AI Upgrades to Adobe Photoshop and Premiere Elements
While Premiere Elements 2023 is receiving a couple of new features and a considerable speed boost, Photoshop Elements 2023 adds some powerful new features and enhanced...
Cloudflare Revolutionizes CAPTCHAs
Turnstile, an ambitious new project from Cloudflare, aims to do away with the CAPTCHAs that are now being used on the internet to confirm users are not robots. Turnstile utilizes...
DDoS Attacks Target Major U.S. Airports
Some major U.S. airports' websites were inaccessible early on Monday, October 10, 2022, due to a coordinated denial-of-service assault orchestrated by professional hackers....
Cybersecurity Attack Hits U.S. Healthcare System
On October 4th, 2022 a cybersecurity incident has disrupted CommonSpirit Hospitals. With more than 150,000 employees, 20,000 physicians, and serving 21 million patients,...
The Advantages of VoIP for Businesses
Voice over IP, or VoIP, has become increasingly popular among business owners. However, many business owners ask if VoIP is viable in a landscape where many voice systems are...
Updated Malware Attacks Point of Sale Devices
This year, security experts have found three updated versions of Prilex malware that target point-of-sale systems. In 2014, Prilex was a type of malware that targeted ATMs. It...
Create a Secure Environment for Remote Workers
Having remote workers in your business is a great way to expand cost-effectiveness and helps your business grow. But, unfortunately, many businesses have issued remote workers...