Report: Adobe Reader is blocking antivirus tools from scanning loaded PDF documents
Adobe is blocking several antivirus tools actively from scanning PDF documents loaded by its Adobe Acrobat Reader application, according to a security report published by Minerva Labs. The company found evidence that […]
Rapid7 research reveals which data ransomware groups seek and use for leverage
When it comes to ransomware attacks, some data is more precious to ransomware groups as others. A new research study by Rapid7, Pain Points: Ransomware Data Disclosure Trends, provides insight on the […]
Microsoft Defender for Android, Apple iOS and macOS, and Windows now available
Microsoft Defender, the default security application on Windows, is now available as a standalone solution for the mobile operating systems Android and iOS, for Apple's macOS operating system, and for Windows. Microsoft […]
Intel Firmware updates for Memory Mapped I/O security vulnerabilities
Intel released new firmware updates to address Memory Mapped I/O security vulnerabilities. Intel and Microsoft published advisories this week to inform system administrators about the issues. Microsoft customers may visit the Adv220002 […]
PrivacyTests reveals how your web browser does privacy-wise
All web browsers support some privacy features, some more than others, but none protect users 100% against all privacy threats; that is the quintessence of the tests that PrivacyTests runs regularly. PrivacyTests […]
Your browser stores passwords and sensitive data in clear text in memory
Your web browser may store sensitive data, including usernames, passwords and session cookies in clear text in memory according to CyberArk security researcher Zeev Ben Porat. Most Chromium-based web browsers appear to […]
Phishing: use of reverse tunnel services to avoid detection and shutdown increases
Security researchers at CloudSEK have noticed an increase in the use of reverse tunnel service and URL shorteners in phishing campaigns. Cyber criminals use services such as bit.ly, Ngrok or LocalhostRun to […]
LastPass introduces passwordless Vault access
LastPass, maker of the password management service, introduced support for accessing a customer's Vault using passwordless technology in June 2022. Passwordless account systems use other means of authentication to provide users with […]
Here is how to protect Windows PCs from Protocol vulnerabilities
Two days ago, security researchers disclosed a vulnerability in the Microsoft Support Diagnostic Tool that affects all client and server versions of the Windows operating system. The tool, designed as a tool […]
Bitwarden's username generator now supports SimpleLogin, AnonAddy, and Firefox Relay email alias services
Bitwarden has updated its browser extensions and Web Vault to improve its username generator. The cloud-based password manager introduced the feature in April 2022. What's new in Bitwarden 2022.05.0 Update Bitwarden now […]
Pre-hijacking Attacks of user accounts are on the rise
Most computer users are aware that criminals may gain access to their online accounts, for instance, by stealing or guessing the password, through phishing or other forms of attack. Many may not […]
Pwn2Own 2022: Windows 11, Ubuntu, Firefox, Safari, Tesla and more hacked
The hacking event Pwn2Own took place from May 18 to May 20 of 2022. This year, security researchers managed to hack Windows 11 and Ubuntu, Firefox, Safari, Microsoft Teams, a Tesla and […]
Trackers may collect data that you type even before hitting submit
Many websites come with web forms, for example, to sign-in to an account, create a new account, leave a public comment or contact the website owner. What most Internet users may not […]
Nvidia releases security update for out-of-support GPUs
Nvidia published a security bulletin on May 16, 2022 in which it informs customers about a new software security update for the Nvidia GPU display driver. The update patches security issues in […]
New malware attack stores payloads in the Windows event log
Security researchers have uncovered new malware that is using the Windows event log to store to store malicious codes. The researchers note that this is the first time the technique has been […]
Google, Microsoft and Apple commit to passwordless sign-in standard
Google, Microsoft and Apple have announced support for expanding passwordless sign-in support across major operating systems and devices. The three companies announced plans on May 5, 2022 to support a passwordless sign-in […]
AV-Comparatives: Microsoft Defender has a large impact on system performance
Security research and testing company AV-Comparatives released the results of its April 2022 Performance test. The test analyzed the system performance impact of antivirus solutions on Windows devices. The company ran a […]
Ransomware Study 2022: attacks are up, ransom payments are increasing
Ransomware attacks are increasing and getting more complex, according to the State of Ransomware 2022 report, which cybersecurity firm Sophos published. Companies are getting better at restoring data after attacks, but ransom […]
Ransomware payments are marginal when compared to the overall costs
Ransomware payments by organizations made up about a seventh of the overall costs of ransomware attacks in 2020 according to a new study by Check Point Research and Kovrr. While ransom payments […]
Bitwarden Password Manager can now generate unique usernames
While many people use password managers for the convenience of remembering a single login, the master password, the primary advantage that such programs offer, is that they provide an easy way to […]
Phishing Attacks grew by 29% in 2021 overall. Smishing is on the rise
Phishing attacks have grown by 29% in 2021 when compared to 2020 according to an analysis by Zscaler's ThreatLabz research team. The researchers analyzed data from over 200 billion daily transactions and […]
Microsoft Defender's protective capabilities suffer offline
Microsoft Defender, the default security solutions on modern versions of the Windows operating system, has been doing well in recent antivirus tests of independent organizations such as AV-Comparatives. In 2019, it was […]
Millions of Lenovo devices affected by BIOS vulnerability
Millions of Lenovo notebooks are affected by a serious BIOS vulnerability. Lenovo informed its customers about the vulnerability on its support website this week. The company released firmware updates for some of […]
Workaround for security issue in 7-Zip until it is fixed
Recent versions of the open source archiver 7-Zip have a vulnerability that has not been fixed yet. Successful exploitation of the vulnerability allows privilege escalation and the execution of commands; it appears […]
Muting videoconferencing apps may not prevent them from listening
Videoconferencing solutions have seen a huge boost since 2020. Workers and students started to work or learn from home, and communicated with others using videoconferencing services. Videoconferencing relies on camera and microphone […]
How to detect the Windows Tarrask Malware that uses a bug to avoid detection
Microsoft published information about a new malware on its security website on April 12, 2022. The malware, named Tarrask, exploits a bug in Windows' task scheduling system to evade detection. Tarrask is […]
Symantec says that hackers distributed a modified version of VLC and exploited it for malware attacks
Last week, news began circling around that VLC was being abused by hackers to inject some malware. The issue came to light after Symantec published a report on its Security Threat Intelligence […]
Hundreds of HP printers affected by critical security issues
HP published two security bulletins that inform customers about critical security issues affecting hundreds of the company's printer models. Firmware updates that patch the security issues are available for some printer models […]
KeePassXC 2.7.0 update with improved Auto-Type, Tags for entries launches out of beta
KeePassXC 2.7.0 has been released to the stable channel. The update brings several new features that were tested in the beta version. My previous article covers most of the changes in this […]
Western Digital's EdgeRover desktop program had a bug that granted elevated privileges on Windows and macOS
Last year, Western Digital users ran into trouble with their My Book Live Drives, which were wiped automatically due to a bug in the firmware. Now, the company's desktop utility, EdgeRover, has […]
After retiring Bitdefender Free, Bitdefender launches Antivirus Free for Windows
Security company Bitdefender announced last year that it would retire Bitdefender Free at the end of 2021. Now, three months later, the company launched a new free product, called Bitdefender Antivirus Free. […]
KeePassXC 2.7.0 Beta adds support for Windows Hello, Touch ID, Apple Watch, improves Auto-Type, and more
KeePassXC has been updated to 2.7.0 Beta, which brings a slew of new features. Notably, the Auto-Type and Quick Unlock experience has been improved. What's new in KeePassXC 2.7.0 Beta Tags and […]
Open Source Tool Unredacter restores text that has been pixelated
Unredacter is an open source tool that is designed to restore text that has been pixelated. Sharing screenshots and other images is done with the press of a button on today's devices. […]
Microsoft Defender gets better at preventing Windows passwords from being stolen
Microsoft is strengthening Windows' security by adding a very important rule to its antivirus. A new ASR rule is being introduced to Microsoft Defender. Before we get into it, let's talk about […]
Microsoft Defender Preview is now available on Windows 10 and 11
Microsoft is prepping a new security app for Windows 10 and 11. This is the Microsoft Defender Preview, let's see what it does. First things first, the app doesn't replace the default […]
Your device's GPU may be used for fingerprinting purposes
Researchers from universities in Israel, Australia and France have discovered a device identification technique that is based entirely on GPU fingerprinting. Fingerprinting in the computing world refers to the identification of devices […]
Moonbounce is a persistent malware that can survive drive formats and OS reinstalls
A new malware has been making the headlines over the past few days. The rootkit, that has been identified as Moonbounce, is a persistent malware that can survive drive formats and OS […]
Microsoft says Powerdir vulnerability in macOS could have given attackers access to user data
The Microsoft 365 Defender Research Team has revealed that it discovered a security vulnerability in macOS Monterey. This is the 2nd time the Redmond company discovered a security issue in macOS, after […]
Avira is adding a crypto miner to its products as well
Et Tu, Avira? Ashwin reported last week that Norton was adding a new component, called Norton Crypto, to its security products. Norton Crypto is a crypto currency miner that will run when […]
KeePass 2.50 speeds up key derivation functions significantly
The developer of the password manager KeePass released KeePass 2.50 to the stable channel. The new version of the program speeds up key derivation functions significantly. The new version of KeePass 2 […]