In a perfect world, once you set up a Windows password, all is secure and safe, right? Unfortunately, that’s not the case. A Windows login password offers a very basic level of protection that mainly keeps your files safe from others who may share your…
Google+ to go offline after security breach discovered
Following an exposé by WSJ that revealed Google had kept a huge bug in their Google+ social network under wraps, the search giant has decided to shut it down by late 2019. The bug might have enabl…
As a global community, we’ve been cruising around the internet for over twenty years. And we’ve gotten pretty darn fast at it. The cyber-highway is like an uber-autobahn, down which we all zip at lightning speeds, paying the credit card bill, making re…
Are you one of the 50 million people who found themselves logged out of Facebook upon waking this morning? If so, there’s no cause to panic. Here’s what’s happening.
Over the past year, have you done any online shopping at Macy’s, Sears, Kmart, or Adidas? How about any in-store shopping at Lord & Taylor, Forever 21, or Saks Fifth Avenue? Have you eaten at Panera Bread or Whole Foods? Bought electronics at Games…
Behold, the dawn of WPA3! Well… actually, there’s nothing much to see yet.
Security flaws haunt Ghostscript
For the third year in a row, researchers have found exploitable flaws in the open source software Ghostscript, a PDF and PostScript interpreter used by hundreds of programs on all major platforms. While the software in…
Here’s the news #nofilter: thousands of Instagram users are reporting that their accounts were hacked this month, possibly the result of a so-called spam bot attack.
Every week, our researchers round up the latest security news and report our findings in these blog pages. If you’ve been reading, you may have noticed a particularly nasty trend claiming new victims week after week — data breaches. In the last two mon…
Social website Reddit announced this week that they suffered a data breach in June. In its official statement, the company calls the breach a “security incident” and provides a detailed account of how it happened.