About six years ago, vulnerabilities were discovered that affected most Intel and AMD processors. The vulnerabilities, Spectre and Meltdown, can be exploited to read sensitive data from attacked computer systems. Intel released […]
KeePassXC has been updated to 2.7.7. The latest version of the open source password manager adds support for Passkeys, and has gained the ability to import your vault data from Bitwarden. Passkeys […]
It took Malwarebytes nearly five years to release the next iteration of its Malwarebytes security program. Malwarebytes 5.0 is available now for all supported operating systems (Windows, Mac, iOS, and Android). Malwarebytes […]
A new malware called RustDoor is targeting macOS users. The malware has been undetected for 3 months, and poses as a Microsoft Visual studio Update. The malware was discovered by Bitdefender. A […]
The developer of the free password manager KeePass has released version 2.56 of the Windows application. KeePass is a local password manager by default; this means that it does not require a […]
The Document Foundation has released a new version of the open source Office application LibreOffice. LibreOffice 24.2 is already available for all supported platforms. Existing installations of LibreOffice may inform users about […]
Microsoft Word for the web has gained a new feature. The online version of the word processor now supports link previews in documents. Users who are familiar with Word Online and the […]
A security researcher has unearthed what appears to be one of the biggest password dumps ever. Over 70 million unique credentials have been leaked on the dark web. The news came to […]
Bitwarden users have a number of options already when it comes to signing-in to their vaults. They can use a master password and improve security by adding a two-factor authentication option to […]
LastPass is making some changes to enhance the security of its to user accounts. The news comes as a follow-up to the company's plans to enforce stronger passwords a few months ago. […]
Remember the movie Groundhog Day? Bull Murray plays a rather self-centered weatherman who finds himself in a time loop on Groundhog Day. Windows administrators may have similar feelings to Murray's in regards […]
Each year, analysts at various Internet security companies release lists of the most used (and known) passwords. These lists are based on leaked password database data. The passwords that are on these […]
Users of the chat app Discord may now protect their accounts using security keys. The developers of Discord have added the option to the existing arsenal of multi-factor authentication options that the […]
Scamio is a new AI tool that promises to help Internet users combat scams. Spam and scams are common on today's Internet. Especially users who are not tech-savvy may have difficulties distinguishing […]
A recent update for Avira antivirus software for Windows seems to have a negative impact on system stabilization for some users. For a couple of days, Avira users have reported issues with […]
Many commercial computers are vulnerable to a set of vulnerabilities that exploit flaws in the processing of startup logos during boot. Security researchers at Binarly have disclosed security vulnerabilities in system firmware […]
BLUFFS is an acronym for a new Bluetooth vulnerability that security researcher Daniele Antonioli disclosed recently. BLUFFS, which stands for Bluetooth Forward and Future Secrecy, is actually a set of six unique […]
On Tuesday, Okta revealed that hackers had stolen data from all of its customer support users in a major breach of its customer support system. The company had previously said that only […]
In a recent social media post, the Middletown Division of Police in Ohio has put an iPhone NameDrop warning for parents. Introduced in the iOS 17 update, this feature allows users to […]
Bitlocker is the default encryption technology of the Windows operating system. It is used widely on Windows, but some users prefer third-party solutions, such as VeraCrypt. What many users of Bitlocker don't […]
LibreOffice is a popular open source Office suite for Windows, Macintosh and Linux. It is one of the top choices when it comes to replacing Microsoft Office with a free alternative. The […]
Healthcare SaaS provider Welltok has disclosed a data breach that has compromised the personal information of nearly 8.5 million patients in the United States. Welltok works with healthcare providers across the US, […]
Security researchers at Blackwing Intelligence managed to bypass Windows Hello fingerprint authentication on devices with the three most used fingerprint sensors on Windows. The researchers were asked by Microsoft's Offensive Research and […]
Users of eBay had several options up until now to improve account login security using 2-step verification. They could get texts or emails from eBay that contain the code, or get codes […]
Threat researcher Kevin Beaumont has been tracking attacks against various companies, including the Industrial and Commercial Bank of China (ICBC), DP World, Allen & Overy, and Boeing, and found they had something […]
Microsoft Office 2024 exists, does not require a subscription and it will be released in 2024. Microsoft Office is provided in two different versions and several editions currently. There is the subscription-based […]
Sweden-based VPN provider Mullvad announced today that its public encrypted DNS servers run fully in RAM. The announcement comes less than two months after Mullvad completed the migration of its VPN infrastructure […]
Microsoft Authenticator will suppress suspicious authentication prompts to protect users against social engineering attacks. Microsoft has now enabled the security feature, which it unveiled back in August 2023. Microsoft Authenticator is a […]
Apple's "Find My" network is a powerful tool that can help users locate their lost or stolen devices. It works by using a combination of GPS and Bluetooth signals from other Apple […]
The Common Vulnerability Scoring System (CVSS) is an open standard for assessing the severity of computer security vulnerabilities. CVSS scores are used by organizations and individuals around the world to prioritize vulnerability […]
A new version of the open source password manager Bitwarden is now available. Bitwarden 2023.10.0 introduces a number of important features to the password manager. Noteworthy additions are supported for saving passkeys […]
Party Animals users have a golden opportunity: they can snag a month's subscription of Discord Nitro completely free of charge, starting from October 31, 2023, at 5PM PT, running up until December […]
Cybercriminals are constantly evolving their tactics to exploit the latest trends and technologies. One way they do this is by using the names of popular celebrities to create phishing scams and other […]
Cybersecurity researchers have discovered a sophisticated cross-platform malware platform named StripedFly malware that has infected over 1 million Windows and Linux systems since 2017. The malware, which was wrongly classified as just […]
The Tor Browser project asked the penetration testers at Cure53 to audit core components of the project. Among the components were the BridgeDB software, building infrastructure, specific Tor Browser alterations and rdsys […]
On September 29, 2023, 1Password discovered suspicious activity on its Okta tenant. The investigation revealed that the threat actor used a HAR file stolen in the recent Okta breach to access the […]
If you use VMWare Workstation Player to run virtual machines on your devices, you may want to update the existing version of the application to the newly released 17.5 version. VMWare Workstation […]
Email communication is integral to businesses, with Microsoft Outlook being one of the foremost platforms for this purpose. Given its critical role, any disruptions due to corrupted or inaccessible OST and PST […]
Users of the free version of the Dashlane password manager will soon have to cope with a severe limitation. Starting on November 7th, 2023, Dashlane Free will support a maximum of 25 […]
WinRAR users who have not updated the archiving software in some time may want to do so immediately. A report by Google's Threat Analysis Group TAG suggests that government-backed actors are exploiting […]