Most Recent Articles
A New Year, A Safer You: 10 Resolutions for a Secure and Affordable New Year
We couldn’t let 2024 pass without reminding you about the importance of prioritizing digital safety.
Cybercriminals are active year-round, but the Holiday season and New Year present unique risks, from phishing scams to vulnerabilities in outdated sof…
How to Spot a Voice Cloning Scam
Voice cloning – an AI application that generates a synthetic copy of a person’s voice – can be a powerful assistant for those who’ve lost their voice due to accident or illness. It facilitates translations, speech therapy, and assistive reading. It hel…
Authorities Uncover Massive Vishing Ring With Over 10,000 Victims
A joint operation involving Spanish and Peruvian authorities has uncovered and dismantled a sophisticated voice phishing (vishing) ring responsible for defrauding over 10,000 victims.
A well-coordinated takedown of a sophisticated operation
The cri…
Update Your iGear – Apple Patches Dozens of Security Holes in iOS 18.2, macOS Sequoia 15.2, and More
Apple’s iOS 18.2 is finally here, delivering not just the much-awaited AI “fix” to avid fans, but a wide range of actual fixes for the security side of things as well. The rest of Apple’s gizmos also get important security amendments this week.
iOS 18…
Enhancement to the data usage tracking for device at an application level
A new parameter added to the Android MDM policy significantly enhances data usage tracking on devices by tracking comprehensive data usage logs. An Excel report is generated that gives a detailed data consumption for each app, including the amount of d…
Doughnut orders disrupted! Krispy Kreme suffers hack attack
Krispy Kreme, the dispenser of delectable doughnuts, says that it suffered a cyber attack at the end of last month which saw its IT systems compromised and has disrupted online orders in parts of the United States.
In a mandatory SEC filing, the compa…
Enhancement to the data usage tracking for device at an application level
A new parameter added to the Android MDM policy significantly enhances data usage tracking on devices by tracking comprehensive data usage logs. An Excel report is generated that gives a detailed data consumption for each app, including the amount of d…
Police from 15 Countries Shut Down Major DDoS-for-Hire Platforms
A major joint operation involving law enforcement agencies from 15 countries has dismantled 27 distributed denial-of-service (DDoS) platforms.
The operation, dubbed “Operation PowerOFF,” has also led to the arrest of multiple administrators of such pl…