May 11, 2021 Tulsa, Oklahoma recently suffered a ransomware attack on the city's network, forcing the city to shut down its systems to prevent the further spread of the malware. While Tulsa Mayor GT Bynum stated that employees more...
May 11, 2021 In a recent statement on Twitter, Microsoft stated that it is investigating an Office 365 issue that has led to legitimate emails from multiple domains, including Google and LinkedIn, being marked as malicious and quarantined. more...
May 11, 2021 In a recent support article spotted by Bleeping Computer, Whatsapp stated that it plans to slowly limit the functionality and scope of access users have until they accept the new privacy policy that allows WhatsApp more...
May 11, 2021 Infosec experts say that Chief Information Security Officers (CISO) must add CISO multi-factor authentication (MFA) for logins to increase protection against cyber theft and data breaches. According to Vancouver-based account executive and cyber specialist Derek more...
May 10, 2021 New iOS 14.5 updates allow users to decide whether they want to "opt-in" to let Apple track their data through the app-tracking tool. After two weeks of the update going live, only 13% of iPhone more...
May 10, 2021 Google will automatically enable two-step verification (2SV) for Gmail users and account holders. The security feature is widely regarded as a way of protecting users from phishing and hackers. Yesterday, Google asked its two billion more...
May 10, 2021 Google will introduce more stringent privacy information requirements for developers who publish apps in its Play Store under similar Apple policies. The company will soon require developers to specify what data is collected and stored, more...
May 10, 2021 In 2015, Apple uncovered 2,500 malicious apps downloaded 203 million times by 128 million users, including 18 million from the United States. Apple failed to notify the users. While Dale Bagwell of Apple's Customer Experience more...
May 10, 2021 A recent discovery by a German security expert showed that Apple's AirTag can be hacked and its software modified. An investigation of the AirTag microcontroller allows revealing elements to be reprogrammed to alter the functionality more...
May 10, 2021 In order to prevent user tracking, browser developers are restricting third-party cookies. In light of this, advertising companies, the primary beneficiaries of third-party cookies, have proposed different programming APIs that advertisers can use for interest-based more...