Active DirectoryBeing Targeted By Malware Called TrickBot

The malware named TrickBot has some new tricks up its sleeves. Recently, a new strain of the malware was spotted in the wild with new capabilities that allow it to target the Active Directory database stored on compromised Windows domain controllers. While TrickBot has never been seen as one of the most dire threats in…

Read More

New IRS Tax Scammers Use Personal Data For Big Returns

Recently, the Department of Justice brought charges against Babatunde Olusegun Taiwo for using personal information acquired on the Dark Web. He used the information from data breaches to file fraudulent tax returns with the IRS. He was able to gain enough information to file more than two thousand income tax returns that attempted to claim…

Read More

New Ransomware Leaks Confidential Data To Public

There’s a disturbing emerging trend in the world of hackers who make use of ransomware to extort payment from companies. Increasingly, if a company won’t pay, their data that was stolen and encrypted is being published for all to see. KrebsOnSecurity recently identified a website associated with the creators of the Maze ransomware strain that…

Read More

Microsoft Releasing New Chromium Based Edge Browser To Users

Microsoft Edge is dead. Long, live Microsoft Edge! The tech giant Microsoft has seen enormous success in a variety of markets, but it never could make a dent in Google’s dominance in the browser market. As of January 15th, 2020, it appears that the company has given up trying. The old Microsoft Edge is being…

Read More

Messaging Gets Upgrade For Instagram Users

Mark Zuckerberg’s social media empire is chasing growth. It’s not hard to understand why. Facebook is the world’s largest social media platform, with more than 2.4 billion users worldwide. The bigger you get, the harder it is to grow. That is exactly why Zuckerberg zeroed in on the three fastest platforms in his empire: Messaging,…

Read More

New Malware Sends Offensive Texts From Your Phone

Malware tends to be at its most effective when it exists in secret. Under the radar. This is what allows malicious code to burrow deep into an infected system and capture a wide range of data. It’s what allows cryptojacking software to quietly siphon off computer power to mine for various forms of cryptocurrency. That…

Read More

iPhone Now Works As A Security Key For Google

Google continues to improve security and its user experience in the Apple ecosystem. The most recent update to the company’s Smart Lock app on iOS allows users to use their iPhone as a physical security key (if and where two factor authentication technology is enabled). Once it’s set up, it works like this: If you…

Read More

Wyze User Information Leaked Include Emails And Other Data

Wyze is one of the many manufacturers of consumer-grade smart devices. They recently confirmed that user data belonging to nearly two and a half million of its customers was exposed. The root cause of the exposure was traced back to an unsecured database connected for nearly a month to an Elasticsearch cluster. This was during…

Read More