Are You Sure Your WhatsApp Messages Are Private?
What’s your preferred social networking app when it comes to communicating with your friends and family? If it’s WhatsApp, there are a few privacy concerns. Of course, most apps have a tainted reputation, and we could... Read more
Change Your Weak Server Passwords ASAP If You Do Not Want to Face GoldBrute
Those of you who have been interested in the online threat landscape for the last few years probably know what Microsoft's Remote Desktop Protocol (or RDP) is. You've seen it being used in more than a few large-scale... Read more
How to Protect Your Password From the Rootkit-Enabled Scranos Malware
Beware, the Scranos rootkit malware, which has been running wild recently, can do serious damage to you by stealing your passwords and user credentials through a fake certificate. However, if you have become the... Read more
Top 8 Security Tips If You Use Instagram for Business
Do you own or manage a business? If you do, the chances are that you use some kind of social media to promote your product or services. There are many platforms to choose from, starting with LinkedIn and ending with... Read more
7.7 Million LabCorp Customers Were Potentially Hit by a Massive Data Breach
Quite a few people were worried when Laboratory Corporation of America Holdings (better known as LabCorp) announced that it had suffered a cyberattack on July 16, 2018. This is not terribly surprising. After all,... Read more
How to Set up a Password to Protect a PDF File in Adobe Reader
Just about everyone uses the PDF file format. The PDF format is very useful and thus very wide-spread among users and businesses. With the PDF format, you can freely send and receive information, your content, and you... Read more
Follow These 4 Steps to Ensure That You Are Safe When Using Google Chrome
Nowadays hackers have various methods to steal our sensitive or private information, and so there are lots of safety measures to consider if you want your data to be secured. Users are often recommended to watch out... Read more
Tech Data Corporation Left 264GB of Personal and Financial Information in an Unprotected Database
Some of you may be unfamiliar with the name Tech Data Corporation, but you are bound to have heard of its customers. Tech Data is a Fortune 500 company that supplies some of the world's biggest technology enterprises... Read more
Yet Another Spam Campaign Uses CVE-2017-11882 to Deliver Malware
We recently touched upon the problem of vulnerability management and patching. The fact of the matter is, a very large portion of users and organizations that rely heavily on computers are completely unaware of how... Read more
Hackers Exploit Only 5.5% of All Security Vulnerabilities, but That Is Not Good News
How do you deal with security vulnerabilities? Well, for individual users, things shouldn't be too hard. In fact, more often than not, all they need to do is enabled the automatic updates for their software... Read more
How to Backup Your Computer Before Performing a Factory Windows Reset
There is a multitude of ways in which a user's important files can be lost wholesale - from accidents, power surges, regular hardware failure, software issues to malware. Such unfortunate events can damage your PC,... Read more
'Game of Thrones' Fans Need to Beware of Phishing Scams
Game of Thrones has ended, but, sadly, we cannot say the same about phishing scams targeted at the TV show’s fans. Apparently, cybercriminals see the continuing interest in the TV series as a perfect opportunity to... Read more