admin

How to Avoid Social Security Scams: Spot the Red Flags and Protect Yourself

Social Security scams are one of the most common and costly forms of fraud targeting Americans today. Criminals impersonate officials from the Social Security Administration (SSA), the Office of the Inspector General (OIG), or even the U.S. Department of Justice (DOJ) to try to trick you into handing over money or personal information.  These scams can arrive by phone, email, […]

How to Avoid Social Security Scams: Spot the Red Flags and Protect Yourself Read More »

What is Multifactor Authentication (MFA) and Why Should You Use It?

You can protect your online accounts with more than just a password. Multifactor authentication (MFA) adds another layer of protection—think of it like securing your front door with both a deadbolt and a keypad lock. MFA is a simple, effective way to keep hackers out, even if they manage to get your password.  What is

What is Multifactor Authentication (MFA) and Why Should You Use It? Read More »

New Rules Impact 500 Million Outlook Users

Email has been both a blessing and a curse for billions of users. Unfortunately, it’s definitely been a blessing for hackers and a curse for consumers who receive their phishing attacks, malware attachments and more. Although highly-targeted “spear” phishing attacks are increasingly seen as the way to go by sophisticated threat actors, there’s no doubting

New Rules Impact 500 Million Outlook Users Read More »

Ethiopia, Uganda, Angola, Ghana, Nigeria top African countries targeted by threats

Check Point Software Technologies released its Global Threat Index for December 2024, emphasising the growing sophistication of cybercriminals. For Africa, December was hardly a season to be jolly with eight of the continent’s countries listed among the top 20 most attacked. Ethiopia retained its top spot as the most attacked country with a 98.2% Normalised

Ethiopia, Uganda, Angola, Ghana, Nigeria top African countries targeted by threats Read More »

Grubhub says hack on third-party exposed information on campus customers

The delivery service Grubhub said a hacker stole personal data and partial payment card information from customers through a third-party contractor. In a statement published on Monday evening, the company said it recently identified a security incident that “originated with an account belonging to a third-party service provider that provided support services to Grubhub.” The

Grubhub says hack on third-party exposed information on campus customers Read More »

US Treasury says Chinese hackers stole documents in ‘major incident’

WASHINGTON (Reuters) -Chinese state-sponsored hackers breached the U.S. Treasury Department’s computer security guardrails this month and stole documents in what Treasury called a “major incident,” according to a letter to lawmakers that Treasury officials provided to Reuters on Monday. The hackers compromised third-party cybersecurity service provider BeyondTrust and were able to access unclassified documents, the

US Treasury says Chinese hackers stole documents in ‘major incident’ Read More »

How to tell if a USB cable is hiding malicious hacker hardware

Are your USB cables sending your data to hackers? We expect USB-C cables to perform a specific task: transferring either data or files between devices. We give little more thought to the matter, but malicious USB-C cables can do much more than what we expect. These cables hide malicious hardware that can intercept data, eavesdrop

How to tell if a USB cable is hiding malicious hacker hardware Read More »

Hackers Using Sitting Ducks Attack To Hijack Domains, 1 Million Domains Vulnerable

Over 1 million registered domains could be vulnerable to a cyberattack method known as “Sitting Ducks,” as recently unveiled in a new report from Infoblox Threat Intel. This relatively unknown attack vector allows malicious actors to hijack legitimate domains by exploiting misconfigurations in DNS settings. The Sitting Ducks attack, which has been active since 2018,

Hackers Using Sitting Ducks Attack To Hijack Domains, 1 Million Domains Vulnerable Read More »

New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics

Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only expands on its functionality, but also incorporates destructive capabilities to prevent the compromised device from booting up. “While the iOS implant delivery method closely mirrors that of the macOS version, the post-exploitation and privilege escalation stages differ significantly

New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics Read More »