New Phishing Attack Delivers Three Types Of Malware

Phishing campaigns get more effective the more closely they can imitate a trusted source.  Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and ...

Use the iPhone Camera’s Zoom to Avoid Glare and Shadow

We increasingly need to take photos of documents—vaccination cards, driver licenses, passports, etc.—to submit for online verification. That’s often easier said than done, especially when taking a photo at night under lights that obscure the text with glare and shadows. ...

Microsoft Warns New Sysrv Botnet Variant Is Dangerous

Security researchers employed by Microsoft have recently spotted a variant of the Sysrv botnet.  They have dubbed the new variant Sysrv-K. This new variant works in two ways.  First, it exploits a ...

You Might Need This HP Bios Security Update

HP recently released a BIOS update to address a pair of high-severity vulnerabilities that affect a wide range of PC and notebook products offered by the company.  In both cases, the vulnerabilities ...

Easily Share Wi-Fi Passwords with Other People and Devices

You’re on vacation with your family, staying in an Airbnb, with multiple Apple devices to connect to the apartment’s Wi-Fi. Typing the password repeatedly would be a pain, but happily, Apple has added a password-sharing feature to all its operating ...

Update Zyxel Products To Fix Possible Security Vulnerability

Do you use a Zyxel firewall?  If so, there's good news.  The company has fixed an issue you may not have even been aware that you had. The company pushed out the ...

Say Goodbye To The Apple iPod

It is the end of an era.  Apple recently announced that they were discontinuing the legendary iPod, which is now in its 7th generation of production. When first released more than fifteen ...

The Best Characters to Use When Naming Files and Folders

Back in the early 1980s, DOS filenames couldn’t be more than 8 characters long with a period and a 3-character extension. That was limiting, so when Apple developed the Mac operating system in 1984, it allowed longer names and eliminated ...

Windows 11 May Release New Feature For Copying Information

If you're a member of the Windows Insiders group, then you are likely already aware of this. If not, here's something else to look forward to when Windows 11 is formally released.  ...

New Method Hides Malware In Windows Event Logs

At least one group of hackers has learned a new trick you need to be aware of.  Security researchers at Kapersky Lab have discovered a malicious campaign-in-progress that is using event logs ...