Category Archives: Blog

New Security Vulnerabilities Found In Intel Processors

Remember the Spectre and Meltdown CPU vulnerabilities discovered early last year?  Well, hold onto your hat, because they’ve got company. Recently, researchers discovered a new class of side-channel vulnerabilities in Intel processors that impact every modern chipset the company makes, including those used in Apple devices. The new vulnerabilities exploit weaknesses in something called ‘speculative […]

Hackers Using WhatsApp To Install Malware On Phones

If you’re among the masses of people using WhatsApp, for either Android or iOS, be advised that the Israeli hacking consortium known as the NSO Group may have installed spyware on the device you use WhatsApp on. A massive security flaw identified as CVE-2019-3568 has been discovered and weaponized by the NSO Group. This allows […]

Adobe Removing Older Software And Products Is Upsetting Users

Adobe is facing harsh criticism after they began sending letters out to portions of their user base. The letters inform users of Creative Cloud that older versions of the products they’re using have been discontinued and licenses to use those products have been revoked. Users are to stop using them immediately and upgrade to newer versions […]

Microsoft Seeks To Replace Text Passwords With Biometrics

For almost as long as computers have existed, various companies have promised that passwords would eventually be a thing of the past. Over the years, a variety of different technologies have been introduced that promised to kill the humble and ubiquitous password.  Everything from biometric sensors to facial recognition have been attempted. To date, none […]

New Ransomware Looks Like An Anti-Virus Installation

Dharma is a highly successful ransomware strain. It recently has been made even more successful by a change in the way the hackers controlling it are deploying it. The first part of their latest campaign remains unchanged.  They rely on well-crafted phishing emails to lure employees in. The key difference, however, lies in the particulars […]

This Ransomware Was Inspired By The Matrix Movie

There’s a new threat in the world of ransomware to be aware of, known as MegaCortex. Based on its design, it seems clear that the malware’s authors drew inspiration from the movie, ‘The Matrix.’ It first made an appearance near the start of the year but it wasn’t widely employed by hackers, and as such, […]

Samsung Will Soon Offer Smartphones With 64MP Image Sensor

Samsung is upping the ante in the smartphone world. The company recently announced that they will be introducing 48-mp and 64-mp image sensors for smartphones launching in the fall of 2019. Both sensors employ the company’s Isocell Plus and Tetracell technology. The former was designed to reduce light leakage, and the latter utilizes four pixels […]

Amazon Sellers Dealing With Increased Hacking And Fraud

Amazon has a problem. If you’re an Amazon shopper, that means you have a problem. The company recently revealed that more than a hundred sellers using the company’s platform were victims of what the company is describing as an “extensive fraud operation.” Only a few specifics are known about the conduct of the fraud operation. […]

Chrome Will Offer More Ways To Control Web Tracking

Google announced a pair of important security features of upcoming versions of its Chrome browser at this year’s I/O Developer Conference. Both changes are designed with the same goal in mind: To give users some additional tools to block or at least mitigate the threat of online tracking. The first of the two new features […]

Some Dell Systems Are At Risk Of New Hacks

Do you use Dell equipment at home or in your office? If so, then the recent discovery made by independent security researcher Bill Demirkapi should give you pause. Recently, Mr. Demrikapi discovered a flaw in the company’s SupportAssist utility that comes pre-installed on most Dell systems. If you have an older Dell, know that SupportAssist […]