Uber has finally fixed a vulnerability that allowed bad actors to send emails from Uber’s official email account, but the fix comes seven years after the bug was first reported. Over the years, several researchers have reported the easy-to-…
To provide the best possible security, Avast employs a complex ecosystem of detection techniques. Whenever a file enters your computer or gets executed in your computer, a sequence of checks is performed usually in a fraction of a second. T…
One would think that scammy emails are a thing of the past and that users are digitally educated in this day and age, a fact which enables them to tell which email is a scam and which one isn’t.
One of the biggest threats facing both large and small businesses alike goes by the moniker credential stuffing. In these attacks, the bad guys count on our reuse of passwords across two or more logins, and once they find a user name/passwo…
The human impulse to help another human in need is one of our best instincts. But it’s also one that attracts the worst of humanity. Unfortunately, scammers love to take advantage of our altruistic tendencies — and I recently received two m…
Edward Snowden and Pulitzer Prize-winning journalists Glenn Greenwald and Chris Hedges have recently come together in a video conference call moderated by Amy Goodman of Democracy Now. In the video, the group talks about the past eight year…
“We informed a very small number of customers that the SIM card assigned to a mobile number on their account may have been illegally reassigned or limited account information was viewed,” a T-Mobile spokesperson told BleepingComputer last w…
The term digital freedom contains enough ideas to keep an entire university busy for eternity. The ironic etymology of the English word “digital” is worth an amusing aside, by the way. Originally meaning the numbers 1-10 — those you could c…
A years-long research effort between computer scientists at Stony Brook University and private industry researchers have found more than 1,000 new and more sophisticated phishing automation toolkits across the globe. What’s interesting abou…
Let’s start by taking a minute to think about all of the things we use our phones for. If you’re like most people, your phone is probably connected at a minimum to your email, your social media accounts, your browser, your photos, and your …