3 main reasons to use a VPN
Most VPN users can be put in one of three categories. It all depends on your needs and your threat model. There are many good…
Most VPN users can be put in one of three categories. It all depends on your needs and your threat model. There are many good…
Paying the ransom and not saying a word about what happened is what cybercriminals would like us all to do. The UK’s National Cyber Security…
We take a look at the slow introduction of programming language Rust into the Windows 11 kernel in an effort to make it more memory…
CISA has added a Ruckus vulnerability being abused by the AndoryuBot botnet to its catalog. Along with six older vulnerabilities, the Cybersecurity and Infrastructure Agency…
Last week we reported that Google and Apple were looking for input on a draft specification to alert users in the event of suspected unwanted…
We take a look at a daisy chain of links and clicks leading from a sponsored Twitter ad to a fake BBC website offering up…
We take a look at YouTube’s testing of ad blocking detection and why it might not be popular with users. YouTube is dipping a toe…
Google is offering users the best option to date to securing their accounts from phishing. (Hint: It’s not passwords.) Google has just brought users closer…
We blocked 100% of malware for the sixth consecutive quarter in a row. Malwarebytes has once again earned a perfect score in AVLabs March 2023…
Tech support scams are an ongoing nuisance. Knowing how they operate helps you to recognize them. Despite the occasional arrests and FTC fines for tech…
We take a look at the reaction to Discord’s proposed changes to how usernames work, and why many users aren’t happy with the upcoming alterations.…
Microsoft’s Patch Tuesday round up for May 2023 includes patches for three zero-day vulnerabilities and one critical remote code execution vulnerability It’s that time of…