Category: Cybersecurity

How to secure your Zoom conference line from hackers

0 Comments

<!-- Begin :: Generated by Easy Custom Auto Excerpt --><div class="ecae" style="text-align: inherit"><p>A Zero Day vulnerability in the Mac Zoom Client allows any malicious website to enable the machine's camera

Read Full
ransomware

Ransomware hit … Food Bank, not in Canada yet

0 Comments

<!-- Begin :: Generated by Easy Custom Auto Excerpt --><div class="ecae" style="text-align: inherit"><p>Ransomware attacks hit indiscriminately and sometimes they may affect charitable organizations that can’t afford to surrender to the

Read Full

Firefox ran Enhanced Tracking Protection

0 Comments

<!-- Begin :: Generated by Easy Custom Auto Excerpt --><div class="ecae" style="text-align: inherit"><p>As part of the latest browser update, Firefox has launched a new privacy protection feature, Enhanced Tracking Protection.

Read Full
comodo-sectigo

Comodo revokes certificates

0 Comments

<!-- Begin :: Generated by Easy Custom Auto Excerpt --><div class="ecae" style="text-align: inherit"><p>Comodo revokes certificates used to sign malicious code</p></div><!-- End :: Generated by Easy Custom Auto Excerpt -->

Read Full
browser-vulnerabilities

Browser-based attacks in Windows 10

0 Comments

<!-- Begin :: Generated by Easy Custom Auto Excerpt --><div class="ecae" style="text-align: inherit"><p>The hardware-based isolation technology on Windows 10 that allows Microsoft Edge to isolate browser-based attacks is now available

Read Full

Microsoft Again Most Spoofed as Office 365 Phishing Evolves

0 Comments

<!-- Begin :: Generated by Easy Custom Auto Excerpt --><div class="ecae" style="text-align: inherit"><p>Microsoft is No. 1 again—for all the wrong reasons. The latest “Phishers’ Favorites” report, which highlights brands with

Read Full

Five warning signs you are at risk of a data breach

0 Comments

<!-- Begin :: Generated by Easy Custom Auto Excerpt --><div class="ecae" style="text-align: inherit"><p>Data breaches are one of the biggest threat to organisations today. They can bring operations to a grinding

Read Full