Software - Latest Posts

Google Authenticator adds support for syncing 2FA codes to the cloud

Why you shouldn't turn on Google Authenticator's cloud sync feature

Google Authenticator is a popular two-factor authentication app to create codes for authorization processes. Up until now, Google Authenticator did not sync codes across a customer's devices, which meant that customers had […]

VirusTotal Code Insight: AI-powered malware analysis feature

VirusTotal announced the launch of Code Insight, a new feature of the malware detection and analysis platform, which uses AI to analyse code and provide information on detected threats. One of VirusTotal's […]

Ireland is the next country to ban TikTok

According to a report by The Irish Times, the National Cyber Security Centre (NCSC) has instructed employees of government departments and agencies to remove TikTok from their work-related devices following a thorough […]

Microsoft Word to Amazon Kindle export feature enters beta

Announced in January 2023, the ability to export Microsoft Word documents to Amazon Kindle devices is now available for testing. The feature is available in Microsoft Word for Windows and Word for […]

proton pass

Proton Pass: new password manager announced

Proton, the Switzerland-based company known for its Proton line of products, including Proton Mail, Proton VPN and Proton Drive, announced the launch of Proton Pass today. Proton Pass is a password manager […]

1Password ending support for classic browser extensions

1Password is a popular commercial password management solution. Agile Bits, the company behind the product announced a change recently that affects all users who still use classic extensions. Broken down to its […]

How to jump to the last row with data in Microsoft Excel or Google Spreadsheets

Tools like Microsoft Excel, LibreOffice Calc, or Google Spreadsheets are widely used both in the business world and also at home. If you work with large tables regularly, you may wonder if […]

Microsoft's new naming convention for threat groups sound like an order at a cocktail bar

Strawberry Tempest, Night Tsunami, Aqua Blizzard or Circle Typhoon sound like something that you would order in a Cocktail bar, or a fancy coffee joint. These deliciously sounding constructs are, however, not […]

security-header

KeePassXC security audit published, recommends this security setting

KeePassXC is a popular password manager for Windows, Mac and Linux that uses the KDBX file format from the password manager KeePass. The developers of KeePassXC have published the results of a […]

Western Digital hackers claim to have copied 10TB of company data

Western Digital confirmed a network security incident earlier this month, but did not reveal much in terms of information, as the investigation was still ongoing at the time. The company did shut […]

Kodi confirms user forum data breach

Kodi, maker of the popular entertainment center app, confirmed a data breach of its user forum software earlier this week. The development team became aware of the hack after a dump of […]

FBI warns: avoid public charging stations

The Federal Bureau of Investigation has issued a warning against using public phone and tablet charging stations. Bad actors are using manipulated stations to infect phones and other connected devices with malware. […]

The impact of remote work on cybersecurity: Tips for staying safe

Remote work has seen an incredible boost during the pandemic. As governments and organizations scrambled to get things under control, many workers and students suddenly found themselves in quite the different work […]

MSI warns against installing unofficial firmware after suffering a cyberattack

MSI confirmed that it has become the victim of a cyberattack on Friday. The company published a short statement on its official site about the incident. In it, MSI describes that its […]

android 14 preview

Android April 2023 Security Updates fix several critical vulnerabilities

Google published the Android Security Bulletin for April 2023 earlier today. The bulletin lists vulnerabilities that Google has patched. It is divided into two patch levels: the first contains security fixes for […]

Western Digital confirms network security incident. Some systems offline

Western Digital confirmed a network security incident today and that some of the company's systems, including My Cloud Home and My Cloud OS, are down currently. The company detected the network intrusion […]

Malware exploits decade old Windows bug, which has an opt-in fix

A decade old Windows bug, for which a fix is available, is used by malware currently in attacks against Windows devices. Malware actors may exploit the vulnerability to add malicious code to […]

Everything You Need to Know About Smart Locks

Are Smart Locks More Secure Than Traditional Locks?

Discover the advantages and potential drawbacks of smart locks compared to traditional locks. Learn how smart locks can offer added security features and convenience.

Enpass or Bitwarden password manager: which to pick

Enpass and Bitwarden are two popular password management solutions. The two products have several similarities on first glance, but when you dig deeper, you will notice huge differences. Both password managers include […]

How to secure your data in the Cloud

Storing data in the cloud is often useful to users: from syncing data between devices to cloud-based backups and sharing options. While local storage still dominates, the use of cloud storage has […]

Face biometric authentication isa highly trusted security system in today's world. Let's have a look at pros and cons of facial recognition!

Face Biometric Authentication: Pros and cons

Facial recognition is considered a trusted security measure as most tech giants rely on the technology, offering it as a feature in their devices. While it offers some advantages, there are also […]

Microsoft will block 120 high-risk file extensions in OneNote

As a consequence of ongoing phishing campaigns using Microsoft OneNote, Microsoft announced that it would harden the application against phishing attacks in early March 2023. Microsoft planned to start the rollout of […]

Google Uncovers more Details on Spanish-made Spyware that Targeted UAE Users

After last year’s attack on Google users, the company is now closer to learning where the hackers are. Learn more here!

Azure vulnerability allowed hackers to manipulate Bing results and take over accounts

BingBang, that is the name that security researchers at Wiz gave the Azure platform vulnerability that allowed them to change Bing search results and access Microsoft user data, including emails and work […]

How to stay safe while using public Wi-Fi

Whether you are traveling frequently or a remote worker, relying on public Wi-Fi may not be ideal, but it may be the only option to get work done sometimes. Many may not […]

Dark and Darker Developer Uses ChatGPT AI tool in Bid to Prove it Hasn't Infringed Copyright

Dark and Darker Developer Uses ChatGPT AI tool in Bid to Prove it Hasn't Infringed Copyright

Nexon files lawsuit. See detail of the lawsuit. Check out Ironmace using ChatGPT to show baseless claims.

How to use Bitwarden's Password Manager in Chrome, Edge and Firefox

Users of the Bitwarden Password Manager may install it on their desktop computers and also mobile devices. Computer users may also install the Bitwarden extension in browsers such as Chrome, Edge or […]

The FBI Has Been Buying Bulk Internet Data from This Florida Company

The FBI Has Been Buying Bulk Internet Data from This Florida Company

Discover what type of bulk Internet data the FBI has been purchasing. Discover the name of the Florida company and its affiliates.

How to protect your Windows PC from the attack that led to the Linus Tech Tips hack

One of the world's most popular tech YouTube channels was hacked recently. Linus Tech Tips has over 15 million subscribers on YouTube, but all of the company's technical expertise has not prevented […]

Should you use your browser's password manager or a dedicated app?

Password managers are one of the most important security tools for computer users. They store passwords securely and help with the generation of strong and unique passwords. Computer users have two main […]

GitHub Publishes RSA SSH Host Keys by Mistake, Issues Update

GitHub Publishes RSA SSH Host Keys by Mistake, Issues Update

Recently GitHub seems to be getting its fair share of problems. It all started with the user who published Twitter’s source codes on GitHub. Who remains unidentified as Twitter takes Github to […]

Passwords vs Passwordless: A Debate on Online Security

Passwords vs Passwordless: A Debate on Online Security

Passwords can be a source of frustration for many individuals in the digital age, often viewed as an inconvenient necessity. While they are an essential element of online security, research indicates that […]

Twitter Says Source Code Was Leaked on GitHub, Now It’s Trying to Find the Culprit

Twitter Says Source Code Was Leaked on GitHub, Now It’s Trying to Find the Culprit

Twitter source code revealed on GitHub. Now they’re trying to find the culprit. Twitter has taken the issue to court making demands to GitHub.

TikTok Bans: Governments Worldwide Take Action Over Security and Privacy Concerns

TikTok Bans: Governments Worldwide Take Action Over Security and Privacy Concerns

From the U.S. and Canada to India and Afghanistan, various countries have banned or restricted TikTok due to concerns over privacy and security risks. Click here to learn more.

How Do I Get My Phone To Stop Tracking My Activity?

How Do I Get My Phone To Stop Tracking My Activity?

Our phones are multifunctional devices that help us in many ways. However, every phone activity leaves some kind of digital print, similar to our fingerprints. Almost like creating our digital identity, who […]

Rewind brings ChatGPT into your personal life

Rewind brings ChatGPT into your personal life, but at what cost?

ChatGPT for Me by Rewind is a new AI system that promises to help you find things on your PC, but there are some security issues. Read more!

Hacking contest Pwn2Own: Ubuntu, Tesla, macOs and Windows 11 cracked

It is the third day of the PWN2OWN VANCOUVER 2023 hacking contest. So far, security researchers managed to crack the operating systems Ubuntu, macOS and Windows 11, and other products, including Tesla […]

How To Secure Your Twitter Account Without Sms-Based Two-Factor Authentication

How To Secure Your Twitter Account Without Sms-Based Two-Factor Authentication

Since Twitter disabled SMS-based two-factor authentication (2FA) for non-paying users, there are still ways you can protect your twitter account for free. Stay here to read more about the reasons for this […]

How to add a backup two-step login provider to Bitwarden

Earlier this month, I wrote a tutorial on enabling the upcoming security standard WebAuthn in Bitwarden as a two-step login protection. WebAuthn, which stands for Web Authentication, is integrated into operating systems, […]

Emotet is back: Microsoft OneNote is not a safe place anymore

Emotet is back and ready to strike via Microsoft OneNote email attachments. The Emotet threat, associated with the Gold Crestwood, Mummy Spider, or TA542 threat actor, remains active and resilient despite law […]