Most Recent Articles
New Wi-Fi Restriction policies for improved network security with IBM® MaaS360® Android app version 8.90 (BETA)
From Android version 8.90 (BETA) and later, IBM® MaaS360® introduces new Wi-Fi restriction policies to provide IT administrators with enhanced control over Wi-Fi settings on Android 13+ devices. These new policies use Google’s latest Android 13 APIs by…
Borked Chromecasts are beginning to receive their update – just hope you didn’t do a factory reset
There’s good news on the horizon for Chromecast owners frustrated that their devices have stopped streaming and begun showing error messages instead: Google says it has started pushing out a fix.
As Iain Thomson of The Register reports, the company sa…
Free file converter malware scam “rampant” claims FBI
Whether you’re downloading a video from YouTube or converting a Word document into a PDF file, there’s a chance that you might be unwittingly handing your personal information straight into the hands of cybercriminals.
That’s the warning that has been…
How to Spot a Job Scam – 10 Signs You’re Dealing with a Fake Job Offer
The online job market has become a hunting ground for scammers who prey on hopeful job seekers.
The US Federal Trade Commission last year said that losses to job scams more than tripled from 2020 to 2023 and, in just the first half of 2024, topped $22…
Lazarus Group Continues Crypto Laundering Spree, Drops New Malware Strains
After its high-profile heist on Bybit, North Korea-backed Lazarus Group has been spotted laundering funds on sanctioned mixers and spreading new strains of malware.
Lazarus Group’s crypto heist streak
Lazarus Group rose to infamy due to its predilec…
Monthly Threat Report February 2025: Changes in US Cybersecurity & a Busy Patch Tuesday
The U.S. Cyber Safety Review Board (CSRB) has been shut down. Leadership changes at CISA and more shifts likely. China’s DeepSeek LLM is gaining traction despite ongoing privacy and security concerns.
The post Monthly Threat Report February 2025: Chang…
How to Dodge Debt Collection Scams Like A Pro in 2025
Debt collection scams are among the most persistent and anxiety-inducing of all such schemes. Scammers call, text, or even send you letters insisting that you or your loved ones owe money you’ve never heard of. These scammers are ruthless, threatening …
Botnets & DDoS: How IoT Devices Get Weaponized
Although breached IoT devices can let threat actors move deeper into compromised home networks, they also serve a darker purpose: being weaponized in botnet attacks.
What is a botnet?
As its name suggests, a botnet is a network of internet-connected…