Skip to main content
  1. Home
  2. Security

Security

DuckDuckGo is a privacy-first web browser.

DuckDuckGo’s new browser could help keep Mac users safe on the web

DuckDuckGo's privacy-first web browser has moved from the iPhone to the Mac and it might have even more security and safety than Apple's Safari.
Google passkeys on Android

Google wants to kill your passwords on Android and Chrome with passkeys

Google shared its plans to launch passkeys and make insecure passwords a thing of the pass as part of an industrywide initiative.
Woman Checking Her Email

New COVID-19 phishing emails may steal your business secrets

Google Forms are being used by cybercriminals as a way to obtain sensitive information of business owners through COVID-19 phishing emails.
Computer user touching on Microsoft word icon to open the program.

This dangerous new hacker tool makes phishing worryingly easy

Setting up phishing campaigns for Microsoft 365 has become a relatively straightforward process due to a phishing-as-a-service (PhaaS) platform named Caffeine.
A depiction of a hacker breaking into a system via the use of code.

Over 1M credit cards just leaked to criminals on the dark web

Over 1.2 million credit cards have been distributed via the dark web through a recently launched underground marketplace.
A depiction of a hacker breaking into a system via the use of code.

Hackers have found a way to hack you that you’d never expect

A security flaw has allowed a ransomware gang to effectively prevent antivirus programs from running properly on a system.
ad blocker feat image

The best ad-blocking apps for Android in 2022

If pop-up ads, banner ads, and flashy text all intrude on the web page or video you're viewing on your Android device, get an ad-blocker. Here are the best.
A depiction of a hacked computer sitting in an office full of PCs.

Hackers may be hiding in plain sight on your favorite website

Security researchers have detailed how domain shadowing is becoming increasingly popular for cybercriminals.
A depiction of a hacker breaking into a system via the use of code.

This huge DDoS attack was one of the longest ever recorded

An unprecedented distributed denial of service (DDoS) attack saw over 25.3 billion requests being sent to a target.
A villager looks at a sunset.

Malware has a terrible new way to get to your computer

There's a new avenue of attack for bad actors, and it's via Minecraft and other video games.
Security and Privacy settings open on a MacBook.

Apple’s antivirus strategy for Mac has gone fully preemptive, but is that enough?

According to Howard Oakley at Eclectic Light Company, Apple has updated macOS malware more in the past six months than in the past seven years.
Google Chrome icon in mac dock.

Chrome extensions with 1.4M users may have stolen your data

Researchers from McAfee have discovered five Google Chrome extensions that steal browsing activity, with the add-ons racking up more than a million downloads.
Apple MacBook Pro side view showing keyboard deck and ports.

How to make your Mac private and secure

MacOS is a secure and private operating system out of the box. However, there are a few settings that you can configure to make it even safer and more private.
Plex logo screen.

Plex requires password resets after confirmed breach of personal data

After detecting a possible breach of its systems by an unknown third party on August 23, Plex is requiring its users to change their passwords.
A digital depiction of a laptop being hacked by a hacker.

Hackers are using fake WordPress DDoS pages to launch malware

Hackers are pushing the distribution of dangerous malware via WordPress websites through bogus Cloudflare DDoS protection pages, a new report has found.
A depiction of a hacker breaking into a system via the use of code.

Google just thwarted the largest HTTPS DDoS attack in history

Google has confirmed that one of its cloud customers was targeted with the largest HTTPS distributed denial-of-service (DDoS) attack ever reported.
iOS's App Library page shown on an iPhone 13 Pro.

You need to update your iPhone and iPad right now to fix a critical security flaw

Apple has issued an urgent security update for iPhone and iPad owners to patch a flaw that could allow hackers to take control of the device.
The Logitech Brio 4K Pro attached to a Macbook.

Zoom just fixed a major security flaw on Mac. Here’s why you should update now

Zoom spent the weekend patching a major security flaw in its Mac app, and the update is available right now.
A MacBook with Google Chrome loaded.

How to avoid third-party cookies in every browser

Third-party cookies can track your web activity in general and collect data on you. Here's how to disable and avoid third-party cookies in every browser.
A Starlink dish next to an RV.

Elon Musk’s Starlink satellites hacked by $25 homemade device

A $25 hacking tool that can seemingly breach Starlink’s internet terminals has been revealed by a security researcher.
An individual holding a phone and card.

Selling something online? Watch out for this clever new scam

A credit/debit card stealing scheme that was initially discovered in 2020 has now been detected in Singapore.
A hand on a laptop in a dark surrounding.

North Korean hackers are targeting crypto workers

Hackers believed to be associated with the North Korean group Lazarus have attempted another digital heist by targeting cryptocurrency firm deBridge Finance.
Amazon acquires iRobot

Will Amazon’s iRobot purchase turn your Roomba into a spy?

Amazon's acquisition of iRobot, the maker of Roomba, is a window into a future where one corporation has way too much information about your personal life.
A depiction of a hacker breaking into a system via the use of code.

North Korean hackers target huge crypto exchange — are user funds safe?

North Korean hackers are attempting to lure in cryptocurrency experts via bogus job offers for crypto exchange platform Coinbase.
A depiction of a hacker breaking into a system via the use of code.

Hacking-as-a-service lets hackers steal your data for just $10

A new (and cheap) service that offers hackers a straightforward method to set up a base where they manage their cyber crimes has been discovered.
A depiction of a hacker breaking into a system via the use of code.

Hackers have found a way to log into your Microsoft email account

Account holders for Microsoft email services are being targeted in a fresh phishing campaign, according to security researchers from Zscaler's ThreatLabz group.
Arlo Smart Home Security Kit with An Arlo Pro Camera on fence.

How to protect your smart home from hackers

Are you worried about your smart home getting hacked? While chances are slim, you could have vulnerabilities. Here's how to set up the proper protection.
A large monitor displaying a security hacking breach warning.

U.S. federal court system cyberattack is worse than previously thought

A cyberattack incident that involved the U.S. federal court system infrastructure has been proven to be an incredibly significant and sophisticated attack.
A depiction of a hacker breaking into a system via the use of code.

Europe just suffered its worst DDoS attack ever, but we don’t know why

A record-breaking distributed denial-of-service (DDoS) attack situated within Europe was attempted during July, a new report has confirmed.
A depiction of a hacked computer sitting in an office full of PCs.

Ransomware victims are refusing to pay — but is it working?

A new report has highlighted how ransomware payments to hackers have begun to slow down -- victims are opting to not cave in to demands from threat actors.
A depiction of a hacked computer sitting in an office full of PCs.

This anti-hacker group helps you escape ransomware for free

This week marks the sixth anniversary of the No More Ransom project, an initiative aimed at helping ransomware victims.
A depiction of a hacker breaking into a system via the use of code.

Hackers now exploit new vulnerabilities in just 15 minutes

Hackers are now ​​moving faster than ever when it comes to scanning vulnerability announcements from software vendors.
A digital encrypted lock with data multilayers.

This malware infects your motherboard and is almost impossible to remove

Researchers have discovered malware that has been secretly infecting systems featuring ASUS and Gigabyte motherboards for at least six years.
A stylized composite of the Twitter logo.

Oh great, now our Twitter data is for sale on the dark web

A list of 5.4 million Twitter users' emails and phone numbers just showed up for sale on the dark web.