Cyber criminals are using uniquely crafted phishing emails to infect victims with malware — and they’re doing so by experimenting… Story on ZDNet
Author: ceadmin
What Really Happens In a Data Breach (and What You Can Do About It)
No matter where you get your news, you can’t avoid seemingly weekly stories about the latest data breach. Story on PCMag
Until further notice, think twice before using Google to download software
Searching Google for the Tor anonymity browser didn’t fare any better. Clicking on the Google Ad returned for ‘Tor download’ directed to… Story on Ars Technica
OneNote documents spread malware in several countries
As Microsoft decided to change the default of its Office products to block macros on files downloaded from the internet… Story on TechRepublic
Microsoft warning: These phishing attackers used fake OAuth apps to steal email
Microsoft has warned that fraudulent Microsoft Partner Network (MPN) accounts were used in a phishing campaign that featured bogus apps… Story on ZDNet
Phishing attacks are getting scarily sophisticated. Here’s what to watch out for
Hackers are going to great lengths, including mimicking real people and creating and updating fake social media profiles, to trick… Story on ZDNet
That big Microsoft 365, Teams, and Outlook outage? Here’s what went wrong
Microsoft has given some detail on the causes of the recent cloud outage that affected customers using its services… Story on ZDNet
The Worst Data Breaches in 2022: Were You a Victim?
While 2021 was the year of the breach , 2022 wasn’t far behind. The 2022 Data Breach Report from the Identity Theft Resource Council… Story on PCMag
14 Essential Apps for Ironclad Online Privacy
Our Experts Have Tested 117 Products in the Security Category… Story on PCMag
FBI takes down Hive ransomware group
The FBI has revealed the results of a month-long campaign designed to thwart an infamous ransomware group… Story on TechRepublic