Skip to main content
  1. Home
  2. Cybersecurity


lenovo legion laptops

If you own a Lenovo PC, you need to update it immediately

Lenovo recently issues a security update to hundreds of laptop, desktop, and server models to address six BIOS vulnerabilities.
Steam home screen.

Your Steam account could be in danger because of this new phishing technique

Hackers found a clever new way to hack Steam accounts. Here's how to make sure that you're staying safe.
A person holding a ThinkPad Nano X1 Gen 2 laptop in front of a window.

Online payment fraud has doubled over the past seven years

Online payment fraud has doubled over the past few years, with the largest jump happening between 2020 and 2021. Here's how and why it's happening more.
A video call in progress on Microsoft Teams.

Hackers can now sneak malware into the GIFs you share

This new attack uses Microsoft Teams and GIFs to mount phishing attacks on your computer.
Two-factor authentication on an iPhone.

Here’s why people are saying two-factor authentication isn’t perfect

Two-factor authentication was a big step forward for app and device security, but it isn't perfect.
Google Chrome opened on a laptop.

Here’s why you need to update your Google Chrome right now

Google has just released a new Chrome update that fixes a severe vulnerability. Check how to protect yourself and make sure you have the right version.
A broken Bitcoin over a grey background.

This crypto scammer faces 40,000 years in jail for stealing $2B

A cryptocurrency scammer was just caught by the authorities after a year on the run. The person now faces up to 40,000 years in jail. No, that's not a typo.
Security and Privacy settings open on a MacBook.

Apple’s antivirus strategy for Mac has gone fully preemptive, but is that enough?

According to Howard Oakley at Eclectic Light Company, Apple has updated macOS malware more in the past six months than in the past seven years.
Person's hand holding a smartphone with TikTok's logo on screen, all in front of a blurred background.

This severe TikTok vulnerability gives hackers 70 ways to steal your info

Testing by Microsoft revealed a major vulnerability in the Android version of TikTok. The exploit could give attackers full access to a user's account.
Genshin Impact characters.

This game lets hackers attack your PC, and you don’t even need to play it

Hackers just found a clever way to abuse the anti-cheat system in a massively popular game. Without even installing the game, they can take over the target PC.
lastpass on phone

Hackers stole LastPass source code in data breach incident

LastPass, a popular password manager, confirmed a data breach today in a blog post. Here's everything you need to know and what it means for your data.
Jack Dorsey sits in front of a Twitter logo.

Breaking down the Twitter whistleblower allegations and how it affects the Musk takeover

You've probably heard of the Twitter Whistleblower by now. Let's take a look at some of the serious allegations in their complaint.
A digital depiction of a laptop being hacked by a hacker.

Hackers are using fake WordPress DDoS pages to launch malware

Hackers are pushing the distribution of dangerous malware via WordPress websites through bogus Cloudflare DDoS protection pages, a new report has found.
A depiction of a hacker breaking into a system via the use of code.

Google just thwarted the largest HTTPS DDoS attack in history

Google has confirmed that one of its cloud customers was targeted with the largest HTTPS distributed denial-of-service (DDoS) attack ever reported.
A digital encrypted lock with data multilayers.

Hackers could use this nasty bug to expose government websites

Cybersecurity researchers have reported that a vulnerability in the open-source control system Git has left government domains open to data breaches.
The Logitech Brio 4K Pro attached to a Macbook.

Zoom just fixed a major security flaw on Mac. Here’s why you should update now

Zoom spent the weekend patching a major security flaw in its Mac app, and the update is available right now.
A depiction of a hacker breaking into a system via the use of code.

Hacking-as-a-service lets hackers steal your data for just $10

A new (and cheap) service that offers hackers a straightforward method to set up a base where they manage their cyber crimes has been discovered.
A depiction of a hacker breaking into a system via the use of code.

Hackers have found a way to log into your Microsoft email account

Account holders for Microsoft email services are being targeted in a fresh phishing campaign, according to security researchers from Zscaler's ThreatLabz group.
The Wiseasy point of sale system on a table.

Hackers stole passwords from 140,000 payment terminals using malware

The Android-based payment system, Wiseasy, has experienced a data breach that has allowed hackers to gain control of thousands of its payment terminals.
A large monitor displaying a security hacking breach warning.

U.S. federal court system cyberattack is worse than previously thought

A cyberattack incident that involved the U.S. federal court system infrastructure has been proven to be an incredibly significant and sophisticated attack.
A depiction of a hacker breaking into a system via the use of code.

Europe just suffered its worst DDoS attack ever, but we don’t know why

A record-breaking distributed denial-of-service (DDoS) attack situated within Europe was attempted during July, a new report has confirmed.
A depiction of a hacked computer sitting in an office full of PCs.

Ransomware victims are refusing to pay — but is it working?

A new report has highlighted how ransomware payments to hackers have begun to slow down -- victims are opting to not cave in to demands from threat actors.
A dark mystery hand typing on a laptop computer at night.

A data breach can cost millions of dollars — and you might be paying it

A data breach can be disastrous for any company -- and not just in terms of data leaked. The cost of a data breach is now at an average of $4.4 million.
A depiction of a hacked computer sitting in an office full of PCs.

This anti-hacker group helps you escape ransomware for free

This week marks the sixth anniversary of the No More Ransom project, an initiative aimed at helping ransomware victims.
A depiction of a hacker breaking into a system via the use of code.

Hackers now exploit new vulnerabilities in just 15 minutes

Hackers are now ​​moving faster than ever when it comes to scanning vulnerability announcements from software vendors.
A Dell laptop with Windows 10 sitting on a desk.

The latest Windows update is causing major printer problems

Here's how you can maximize the workaround for the Microsoft glitch on the Windows 10 mid-July update.
A depiction of a hacker breaking into a system via the use of code.

You’ll never guess what hackers are using Microsoft Calculator for

Hackers have found an unusual and unconventional method to infect PCs with malware: distributing dangerous code with Windows Calculator.
Two windows laptops sit on a wooden table.

Windows 11 now stops brute force cyberattacks right in their tracks

Windows 11 now blocks brute force attacks with an Account Lockout Policy. Windows will automatically lock down accounts after 10 failed login attempts.
Cybersecurity is a constant battle.

Cyberattacks have nearly doubled since last year, report says

Cyberattacks have nearly doubled since the last year and the odds that you'll be affected are increasing rapidly.
A hacker inputting code into a system.

The world’s most sensitive data could be vulnerable to this new hack

Some of the world's most sensitive data could be vulnerable due to a new hack. Using a SATA cable, an attacker can extract data from air-gapped systems.
Hands on a laptop.

Stealthy malware shows why you shouldn’t open unknown emails

A threat intelligence team has just published a report on malware that arrives as an email attachment and remains undetected by most antivirus programs.
Man holds an iPhone 13 Pro with the iOS 16 logo on screen.

iOS 16’s new Lockdown Mode takes iPhone security to the max

Apple has introduced Lockdown Mode, a new optional layer of cybersecurity designed to protect people at risk of being targeted by mercenary software.
A depiction of a hacker breaking into a system via the use of code.

Hacker steals 1 billion people’s records in unprecedented data breach

A hacker has stated that he has successfully infiltrated a police database, from which he apparently obtained details of one billion Chinese citizens.
The Linksys Hydra 6 dual-band mesh WiFi 6 router.

Oh great, new malware lets hackers hijack your Wi-Fi router

A new report finds hackers are targeting home Wi-Fi routers to gain access to all your connected devices.