Copy and Paste between Devices with Universal Clipboard
Everyone is accustomed to using the Copy and Paste commands on the Mac, but fewer people know that you can also copy and paste between your Mac and your iPhone and iPad. Apple calls this feature Universal Clipboard, and it’s ...
Be Aware That ChromeLoader Malware Is Picking Up Steam
A browser hijacker called "ChromeLoader" has had a large uptick in detections this month, which is raising eyebrows among security professionals. ChromeLoader can modify a victim's web browser settings to show search ...
New Phishing Attacks Use HTML Email Attachments
HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not just simply ...
Apple Previews M2-Based MacBook Air and 13-Inch MacBook Pro
During its Worldwide Developer Conference keynote on June 6th, Apple took a brief break from showing off new features in upcoming operating systems to throw back the curtains on its new M2 chip and a pair of laptops that use ...
Upgrade This WordPress Plugin To Avoid Being Hacked
Do you own and manage a WordPress site either personally or as part of your business? Do you also use the Tatsu plugin which offers a powerful suite of in-browser editing features ...
Update VMWare Apps Now For Critical Security Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory that serves as a stark warning. If you're using VMware products that are impacted by recently disclosed critical security flaws, either ...
Update Addresses Zero Day Exploit For Some Apple Devices
If you're not familiar with the term, a Zero Day exploit is a security flaw that the software vendor is not aware of and hasn't yet patched. In many (but not all) ...
11 New Features Coming in Apple’s 2022 Operating Systems
It’s that time of year again. Apple CEO Tim Cook and numerous Apple employees took the virtual stage again at the company’s Worldwide Developer Conference keynote on June 6th to share what we can expect to see later this year ...
New Phishing Attack Delivers Three Types Of Malware
Phishing campaigns get more effective the more closely they can imitate a trusted source. Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and ...
Use the iPhone Camera’s Zoom to Avoid Glare and Shadow
We increasingly need to take photos of documents—vaccination cards, driver licenses, passports, etc.—to submit for online verification. That’s often easier said than done, especially when taking a photo at night under lights that obscure the text with glare and shadows. ...



