People easily get riled up over online security. With a quick Google search, you can find dozens of articles warning about Trojans, viruses and other security threats. But how many of them do you actually need to worry about? Really, it all comes down to threats that cause massive damage and affect your unique technology…
Couple of months back, Instagram had developed its latest collage app called ‘Layout’. While Instagram is not the first one to plunge into the collage business, this is a great opportunity to see an overflow of interesting and new collages created by users and brands. In their blog, Instagram has described Layout as an application..
Cortana, Microsoft’s assistant app in Windows 10, is getting even more nosey than before. We’re told Redmond will scan your email, in order to remind you to keep your commitments. Sounds benign — helpful, even. But some are worrying that it’s just one more privacy invasion from the Pacific Northwest. Even though you can turn it off,..
Malvertisers are once again abusing ad technology platform AdSpirit and exposing visitors of the MSN homepage to malware. These attacks appeared to have been primarily focused on Germans users via an ad for Lidl, one of the Germany’s leading supermarkets. This is not the first time we have caught malvertising on MSN or via AdSpirit…
Cloud computing is a sea change in the way companies use technology; it’s as inevitable and significant as the shift from steam power to electricity on the factory floor. Because criticisms of the cloud have gotten a lot of hype, however, many companies are hesitant to explore it. In this article McAfee, a principal research..
We talk a lot about threats to data security on this blog, and personal experience has probably acquainted you with everything from Trojan Horses to phishing. Here’s a particularly sneaky threat that’s becoming more and more common: fake patches.
THIS WEEK, HACKERS won a million dollar bounty for discovering a long-sought iOS zero-day. Federal lawmakers introduced the Stingray Privacy Act, a new bill that would require state and local lawmakers to get a warrant before using the invasive surveillance devices. The world got its first look at the full text of the Trans-Pacific Partnership..
Macs can get Ransomware, the devilish family of malware that locks down a victim’s files until he or she coughs up a hefty bounty. Last week, a Brazilian security researcher produced a proof-of-concept for what appears to be the first ransomware to target Mac operating systems (Mac OS X). On Monday, cybersecurity company Symantec verified..
Google Chrome will end support for Windows XP, Windows Vista, and older versions of Mac OS X in the spring.
THE COMPUTER FRAUD and Abuse Act, the law that’s been at the heart of almost every controversial hacking case of the past decade, is in the news again this month. Prosecutors recently used the law to convict journalist Matthew Keys on felony hacking charges, drawing rounds of condemnation on the web. Edward Snowden, for one,..