Security

Fortinet VPN User Passwords May Have Been Leaked Online

Hackers recently released a list of nearly half a million Fortinet VPN usernames and passwords onto the Dark Web. The group behind the attack claims that all the credentials were scraped from exploitable devices last summer. The group also claims that while the vulnerability that made the hack possible has been patched many of the […]

Fortinet VPN User Passwords May Have Been Leaked Online Read More »

Has Your Bandwidth Slowed Down? It Could Be Proxyware

There\’s a lot of money to be made by selling things that don\’t belong to you. That\’s a lesson hackers around the world have learned very well. Their latest venture is selling other people\’s internet bandwidth. You may not have heard the term Proxyware before just now. If not it\’s a new way hackers and

Has Your Bandwidth Slowed Down? It Could Be Proxyware Read More »

Exchange Servers Are The Target Of This New Ransomware

A new ransomware gang known as \”LockFile\” has recently burst onto the scene. They specifically target Microsoft Exchange servers to gain access then proceed to encrypt everything they can find. LockFile employs a trio of vulnerabilities that are collectively known as ProxyShell to gain access to a targeted exchange server. ProxyShell was given its name

Exchange Servers Are The Target Of This New Ransomware Read More »

WhatsApp Mods On Android Devices May Contain Malware

Are you a WhatsApp user? If you are you may have heard of the FMWhatsApp mod. It promises to improve the WhatsApp user experience by improving user privacy, giving access to custom chat themes, emoji packs from other social networking sites, app locking via a customizable PIN, and more. Hackers have hijacked this legitimate and

WhatsApp Mods On Android Devices May Contain Malware Read More »

Stop Phishing Attacks With Microsoft 365

Stop Phishing Attacks with Microsoft 365 Phishing attacks come unexpectedly and can cause great damage with the click of a button. As an end user, it can be difficult to differentiate between phishing attacks and general email content. With Microsoft 365, it is extremely easy to protect again unwanted email content, and more. Microsoft 365

Stop Phishing Attacks With Microsoft 365 Read More »

Google Improving Security And Transparency For Android Apps

Google recently announced some additional details relating to their \”Safety Section\” feature of the Google Play store. This is part of an ongoing effort to make the Play Store a safer and more transparent place. At the center of this plan is a new requirement that app developers must share details about what information their

Google Improving Security And Transparency For Android Apps Read More »

Your Kindle EBook May Lose Partial Functionality Soon

Do you own an older Amazon Kindle? Older Kindles utilize 3G internet connectivity protocols but mobile carriers are currently racing to upgrade their networks to 4G/5G. Older devices that only have a 3G connection option will be frozen out of the internet entirely once the upgrade is complete. Amazon has been emailing owners of older

Your Kindle EBook May Lose Partial Functionality Soon Read More »

Malware Named Xloader Targeting Macs And Stealing Information

XLoader is a newly discovered strain of malware designed to infect systems running macOS. This new strain was built from a malware strain called FormBook which was designed to steal passwords from Windows-based machines. The new strain is currently being offered on at least one forum on the Dark Web. It is being billed as

Malware Named Xloader Targeting Macs And Stealing Information Read More »

Some Older Printer Drivers Are Vulnerable To Hackers

SentinelOne recently published a report that revealed a previously undiscovered security flaw found in a wide range of printers that include printers manufactured by Samsung, Xerox, and HP. The bug is being tracked as a high severity security vulnerability and puts hundreds of millions of older printers in currently in service at risk. The flaw

Some Older Printer Drivers Are Vulnerable To Hackers Read More »