New Phishing Attack Uses Unique Method To Avoid Security

Hackers are always looking for a new angle, and recently, they've found a particularly good one. Image recognition software is becoming increasingly sophisticated. So if hackers are interested in building a fake ...

Toy Company Mattel Was Latest Victim Of Ransomware Attack

When you were growing up, your parents probably bought you all sorts of toys made by Mattel. From Hotwheels to Barbie to the full line of Toy Story toys and more, Mattel ...

Some Businesses Are Dangerously Avoiding Critical IT Security Updates

How good is your IT staff at staying current when it comes to applying all the latest security patches? Unfortunately, the answer for most businesses is, "probably not as good as you ...

Update Adobe Acrobat Reader To Patch Security Issue

A lot of people have a complicated relationship with Adobe Acrobat reader. On the one hand, it's an undeniably useful piece of software and one of the most widely installed and used ...

Cyber Attack Found At Gaming Company Capcom

Are you a gamer? Are you a fan of Resident Evil, Devil May Cry, Mega Man, Monster Hunter or Street Fighter? All of those games have something in common. All were developed ...

WordPress Loginizer Plugin Was Automatically Updated Due To Vulnerability

WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible with the most popular blogging platform on the planet. This time, however, they're ...

Mac And Android Added To GravityRAT Malware’s Targets

Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your computer's ...

Photoshop Testing Security For Images To Prevent Theft And Fakes

Deep Fakes are becoming an increasingly large problem. If you're not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a ...

This New Ransomware Can Infect A Network In Just Minutes

Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, expanding its reach for days, or even weeks before striking and locking your ...

Some Popular Android Apps Found To Include Malware

Google does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification system is world-class. That said, no system is perfect, and that includes Google's. In ...