Skip to main content
A depiction of a hacker breaking into a system via the use of code.

Microsoft data breach exposed sensitive data of 65,000 companies

Microsoft is in a disagreement with a security research firm regarding how a recent breach of its servers has been handled.
ipad pro 2021.

Apple could launch a Frankenstein iPad Pro that runs macOS

A crazy new rumor claims Apple is going to bring macOS to the M2 iPad Pro in place of iPadOS. But there are several reasons why it doesn’t make much sense.
DuckDuckGo is a privacy-first web browser.

DuckDuckGo’s new browser could help keep Mac users safe on the web

DuckDuckGo's privacy-first web browser has moved from the iPhone to the Mac and it might have even more security and safety than Apple's Safari.
A symbol of the Mozilla Firefox logo.

The latest Firefox release redesigns its private browsing feature

Mozilla shows off its Private Browsing mode updates and design makeovers for Cybersecurity month.
Microsoft Defender SmartScreen helps protect users against websites that engage in phishing and malware campaigns.

Microsoft Edge now warns when your typos can lead to being phished

Microsoft has added a new feature to its Defender SmartScreen service to protect users from landing on typo webpages that might be phishing scams.
Facebook logo appears with a hooded figure over a cracked blue background.

This new malware is targeting Facebook accounts – make sure yours is safe

Ducktail malware started as a threat to only Facebook Business accounts, but now everyone is in danger. Here's what you need to know to protect your account.
Stage manager in macOS Ventura.

MacOS Ventura and new MacBooks Pros are both coming soon

Apple’s macOS Ventura operating system could be just a week away. While that’s great news, you’ll have to wait longer for the next MacBook Pro models.
Example of Stable Diffusion on Mac

How to run Stable Diffusion on your Mac

Looking for AI image generation apps to use on Mac? Here are the best ways to get Stable Diffusion software working on your Mac, from downloads to plugins.
MacBook on a table with the Finder sidebar open.

How to customize the Finder sidebar on Mac

Make the most of this convenient spot that lets you open files, folders, apps, and disks with a click. Here’s how to customize the Finder sidebar on Mac.
Microsoft Security logo appears in the corner of a scene with IT workers at computers

Microsoft just gave you a great way to fight Windows brute-force attacks

Windows is about to become more secure with a recent update from Microsoft that should block a large number of brute-force hacking attempts.
The CommonSpirit Health’s logo appears over the silhouette of a hacker.

As ransomware hits this U.S. hospital, lives could be at risk

One of the nation’s largest hospital chains is suffering from a ransomware attack taking computer records offline for nine days, while patients wait.
Woman Checking Her Email

New COVID-19 phishing emails may steal your business secrets

Google Forms are being used by cybercriminals as a way to obtain sensitive information of business owners through COVID-19 phishing emails.
NordVPN company name and logo, blue mountain peaks against a white circle on a blue background.

Is there a NordVPN Prime Day deal?

If you're looking for a great online suite, the NordVPN Complete package is 64% off and comes with three free months. Grab it before October Prime Day is over!
Computer user touching on Microsoft word icon to open the program.

This dangerous new hacker tool makes phishing worryingly easy

Setting up phishing campaigns for Microsoft 365 has become a relatively straightforward process due to a phishing-as-a-service (PhaaS) platform named Caffeine.
An Intel Alder Lake Core i5-12600K CPU and its packaging.

Intel Alder Lake BIOS source code was leaked — should you be worried?

Intel has confirmed that the source code for the Alder Lake BIOS was leaked. What will the consequences be?
A depiction of a hacker breaking into a system via the use of code.

Over 1M credit cards just leaked to criminals on the dark web

Over 1.2 million credit cards have been distributed via the dark web through a recently launched underground marketplace.
Social media mobile apps on a smartphone screen, all on a textured gray fabric background.

Meta found over 400 mobile apps ‘designed to steal’ Facebook logins

Meta has published a report detailing its discovery of over 400 mobile apps that were created to steal Facebook users' login information.
Google Chrome logo appears over photo of laptop with chart of vulnerabilities.

Google Chrome tops this list of most vulnerable browsers

Google Chrome suffered more vulnerabilities than any other browser in 2022 -- and it wasn't even close -- while a little-known browser had zero.
A depiction of a hacker breaking into a system via the use of code.

Hackers have found a way to hack you that you’d never expect

A security flaw has allowed a ransomware gang to effectively prevent antivirus programs from running properly on a system.
how to back up emails in outlook laptop

A new phishing scam pretends to be your boss sending you an email

A business email compromise campaign deceives a company employee into thinking their boss is authorizing a payment, but it's actually a bad actor.
A MacBook with Google Chrome loaded.

New phishing method looks just like the real thing, but it steals your passwords

This new phishing method could make it possible for hackers to steal important data by cloning a trustworthy website or app in Application Mode.
norton 360 deluxe with lifelock deal best buy december 2021 shutterstock antivirus

This dangerous vulnerability tricks researchers by mimicking old threats

The CVE-2022-41040 and CVE-2022-41082 zero-day flaw has been brought to Microsoft's attention after its Exchange email servers were left exposed to bad actors.
Login screen on a MacBook.

How to change the login picture on a Mac

Personalize the screen you see when you sign in on your Mac. We’ll show you how to change the login picture on Mac to match your look, mood, or another user.
A depiction of a hacker breaking into a system via the use of code.

North Korean hackers create fake job offers to steal important data

Microsoft has found that North Korea-based hackers have been using various software and creating fake jobs to carry out malicious cyberattacks.
Close-up of hands on a laptop keyboard in a dark room.

This dangerous hacking tool is now on the loose, and the consequences could be huge

A dangerous hacking tool has just been cracked and is now spreading quickly, potentially putting countless people at risk.
A mockup of a MacBook Pro with an iPhone-style Dynamic Island replacing the menu bar at the top of the screen.

If the Mac gets a Dynamic Island, I’m not sure I want it

One intrepid designer has just brought the Dynamic Island to Apple’s MacBooks in a new render, but I’m not sure it’s a good idea. Here’s why it might not work.
An individual surrounded by several computers typing on a laptop.

New malware can steal your credit card details — and it’s spreading fast

New subscription-based malware is making the rounds, and it can steal anything from passwords to your credit card details.
A man sits, using a laptop running the Windows 11 operating system.

This new Windows 11 feature will help you protect your passwords

The latest Windows 11 update comes with a new feature that will help you make sure your Windows password is protected. Here's how it works.
A depiction of a hacked computer sitting in an office full of PCs.

Hackers may be hiding in plain sight on your favorite website

Security researchers have detailed how domain shadowing is becoming increasingly popular for cybercriminals.
malwarebytes shows av firms failing customers keyboard virus mem2

Malwarebytes resolves error that was blocking Google this morning

Are you having problems with using Google services and websites? It's not just you. Many Malwarebytes users are currently experiencing serious problems.
A depiction of a hacker breaking into a system via the use of code.

This huge DDoS attack was one of the longest ever recorded

An unprecedented distributed denial of service (DDoS) attack saw over 25.3 billion requests being sent to a target.
Windows 11 device sitting on a stool.

The Windows 11 2022 Update has officially launched — here’s how to install it

Here's how to know if your device is eligible for the Windows 11 version 22H2 update and how to install the software for your Windows 11 or Windows 10 devices.
Office computer with login asking for password and username.

Spellcheckers in Google Chrome could expose your passwords

Are you using an enhanced version of spellchecker in Microsoft Edge or Google Chrome? Bad news -- your personal information might be at risk.
Three women in a Microsoft Teams meeting.

How to join a Microsoft Teams meeting

If you have an important call coming up, we're here to tell you how to join a Microsoft Teams meeting in four easy ways.