Category: Cybersecurity

Apple’s third-party companies have access to dialogues with Siri

0 Comments

<!-- Begin :: Generated by Easy Custom Auto Excerpt --><div class="ecae" style="text-align: inherit"><p>Apple are accused of transferring voice recordings of communication with Siri assistant to third-party research companies. This was

Read Full

How to secure your Zoom conference line from hackers

0 Comments

<p><!-- Begin :: Generated by Easy Custom Auto Excerpt --></p> <div class="ecae" style="text-align: inherit"> <p>A Zero Day vulnerability in the Mac Zoom Client allows any malicious website to enable the machine's camera

Read Full
ransomware

Ransomware hit … Food Bank, not in Canada yet

0 Comments

<p><!-- Begin :: Generated by Easy Custom Auto Excerpt --></p> <div class="ecae" style="text-align: inherit"> <p>Ransomware attacks hit indiscriminately and sometimes they may affect charitable organizations that can’t afford to surrender to the

Read Full

Firefox ran Enhanced Tracking Protection

0 Comments

<p><!-- Begin :: Generated by Easy Custom Auto Excerpt --></p> <div class="ecae" style="text-align: inherit"> <p>As part of the latest browser update, Firefox has launched a new privacy protection feature, Enhanced Tracking Protection.

Read Full
comodo-sectigo

Comodo revokes certificates

0 Comments

<p><!-- Begin :: Generated by Easy Custom Auto Excerpt --></p> <div class="ecae" style="text-align: inherit"> <p>Comodo revokes certificates used to sign malicious code</p> </div> <p><!-- End :: Generated by Easy Custom Auto Excerpt --></p>

Read Full
browser-vulnerabilities

Browser-based attacks in Windows 10

0 Comments

<p><!-- Begin :: Generated by Easy Custom Auto Excerpt --></p> <div class="ecae" style="text-align: inherit"> <p>The hardware-based isolation technology on Windows 10 that allows Microsoft Edge to isolate browser-based attacks is now available

Read Full

Microsoft Again Most Spoofed as Office 365 Phishing Evolves

0 Comments

<p><!-- Begin :: Generated by Easy Custom Auto Excerpt --></p> <div class="ecae" style="text-align: inherit"> <p>Microsoft is No. 1 again—for all the wrong reasons. The latest “Phishers’ Favorites” report, which highlights brands with

Read Full

Five warning signs you are at risk of a data breach

0 Comments

<p><!-- Begin :: Generated by Easy Custom Auto Excerpt --></p> <div class="ecae" style="text-align: inherit"> <p>Data breaches are one of the biggest threat to organisations today. They can bring operations to a grinding

Read Full