Most Recent Articles
US Clinical Lab Tells 1.6 Million Customers to ‘Protect’ Their Data Following Cyberattack
A lab providing diagnostic testing services to Planned Parenthood centers across the US is telling customers to take measures to protect their data following a security incident.
Laboratory Services Cooperative, a non-profit based in Seattle, Washingt…
When Should a Child Get Their First Smartphone?
Smartphones are a big part of everyday life, but when is the right time for a child to have one? There’s no universal answer—every child is different, and every family has unique needs. Some parents give their children a phone at a young age to stay in…
Data Breach at Western Sydney University Impacts 10,000 Current and Former Students
Western Sydney University (WSU), a leading Australian educational institution, has recently disclosed two security incidents that exposed the personal details of about 10,000 current and former students.
According to a press release on the WSU website…
Medusa ransomware gang claims to have hacked NASCAR
The Medusa ransomware-as-a-service (RaaS) claims to have compromised the computer systems of NASCAR, the United States’ National Association for Stock Car Auto Racing, and made off with more than 1TB of data.
In a posting on its dark web leak site, Me…
MaaS360 Support Case Creation New Subcategories and Affected Device Requirement
When you report a problem to IBM MaaS360 Support, you will be asked to supply a severity level, category, subcategory, an affected device, error message, and business impact.
Threat Actors Exploit High-Severity Bypass Vulnerability in WordPress Plugin
Security researchers spotted threat actors exploiting a severe WordPress plugin vulnerability almost immediately after the flaw’s disclosure.
Authentication bypass vulnerability in WordPress plugin
An authentication bypass vulnerability affecting th…
Some Free File Converters Aren’t as Safe as They Seem — Here’s Why
Turning a PDF into a Word document, converting a PowerPoint into a PDF, or opening a lesser-known format with free tools found on the internet is something we’ve all done at some point—especially when we’re in a hurry.
Free document conversion web…
SEO Poisoning: How Hackers Use Search Engines to Target Businesses Like Yours
Search engines help us find information quickly, but they can also be misused by cybercriminals. SEO poisoning is a tactic where attackers manipulate search engine rankings to push harmful websites to the top of search results.
This method isn’t just …