Tag: security
Here you can view a specific archive, or you can go to the homepage.
-
New Vulnerability Targets Cable Modems
A new vulnerability shows that even cable modems are free from exploits.
-
Old Browser Scam Has A New Twist
An old browser scam gets new life thanks to an innocuous feature in most browsers.
-
Avast Spying On Users
Avast/AVG Antivirus has been found to be collect a lot of information on their users web browsing habits.
-
New Malware Strikes Biggest WordPress Vulnerability
New WordPress malware exploits the PEBKAC vulnerability found in almost every site!
-
Google Will Automatically Delete Your (Worthless) Data
A little while ago, Google introduced the ability to automatically delete some of the data that it knows about you. While that seems like Google turning over a new more privacy-focused leaf, it might not be quite as meaningful as it first appeared. The setting, which you can find on Google’s Activity Controls Page, allows…
-
Monitor Password Breaches with Firefox Monitor
If you’ve been on the internet for more than a few months, you’ve probably heard about a large number of data breaches that have been happening recently. The website HaveIBeenPwned is a great resource that lets a visitor put in an email address and see whether or not that email address has been part of…
-
Google Calendar Spam is 2019’s Junk Mail
Junk mail, spam email, robocalls, and now…spam Google calendar events. I had the delightful experience of getting some of this spam about 2 weeks ago. Basically I just saw a repeating event for “Win a new iPhone” every day at 6-9pm that endlessly repeated. While this is definitely an annoying thing to have happen, resist…
-
Open-source Dangers: Supply Chain Infection
For software security, many people prefer open-source software. It’s usually functional and inexpensive, although it’s not always pretty. It also (generally) has a reputation for being more secure than closed-source software. But a rash of supply chain attacks have infected many popular open-source projects. Oftentimes the infected code is small and innocuous. As part of…