New Android Malware Disables WiFi To Attempt Toll Fraud
There's a new threat to be aware of if you own an android device. Microsoft recently warned that their researchers had spotted a new toll fraud malware strain wreaking havoc in the Android ecosystem. Toll fraud is a form of billing fraud. It is a scheme whereby bad...
DuckDuckGo Browser Blocks Microsoft Trackers
If you haven't heard of DuckDuckGo, it's a tiny browser that only gets a fraction of the traffic that Google does. If we're being honest, it gets only a fraction of the web traffic that Bing does. The search engine does have some pluck though and bills itself as the...
WordPress Plugin Leaves Sites Vulnerable
Researchers at Defiant authored the popular Wordfence security solution for WordPress users and they have detected a massive campaign that has seen hackers actively scanning for websites employing the Kaswara Modern WPBakery Page Builder plugin. The plugin was...
Technology Advances With Speech-Recognition Via AI Technology
If you haven't heard of the UK startup Speechmatics, it may come as a surprise to learn that the company may be on its way to becoming a globally recognized brand. The company's ambitious goal is to leapfrog over the progress made by America's tech giants in speech...
Windows 11 Apps Are Being Tested For Kiosk Mode
There's interesting news in the world of Windows 11 development. Microsoft recently began testing a new Kiosk feature that will enable IT administrators to limit which applications users can use while logged into their user profiles, blocking all other...
Skimmers Are Stealing Credit Card Information From US Restaurants
If you eat out or are in the habit of ordering take-out on a regular basis, be aware. Recently, a large, well-organized web-skimming campaign has been uncovered that allowed hackers to swipe the payment card details for more than 300 restaurants, impacting more than...
Nvidia Leads Quantum Computing Innovation With New Platform
Quantum computing is on the horizon. Unfortunately, it's been on the horizon for at least two decades. It's one of those technologies that's always "just around the corner." In recent years, however, several important strides have been made. Although quantum...
Large Scale Okta Phishing Campaign Targets Many Organizations
According to ongoing research by Group-IB, a massive phishing campaign is currently underway. This is a campaign that has impacted no less than 130 organizations across a broad range of industries. These include but are not limited to professional recruiting firms and...
New Tools Available With Kali Linux 2022.3
Do you have the Kali Linux distribution running on one of the machines you own? If you're not sure what that is, then you almost certainly don't. Kali is a Linux distro used mostly by "ethical hackers" who use it mainly to perform security audits, cybersecurity...
Microsoft Releases PoC Code For MacOS App Sandbox Vulnerability
MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system. Unfortunately, no system is bullet proof. There's a way that a determined attacker could bypass sandbox restrictions and execute...
FREE Report
The Portland Metro Area Guide to IT Support Services and Fees
What you should expect to pay for its support for your small business (and how to get exactly what you need without unnecessary extras, hidden fees, and bloated contracts)