blog

BLOG

Shlayer Malware Continues To Attack Mac Systems

If you’re a Mac user, you may have heard of the malware known as Shlayer. It first made headlines in the early part of 2018. The malware is primarily used to install malicious adware on infected...

Microsoft Chromium Edge Will Get Internet Explorer Mode

As you may have heard, Microsoft is getting out of the browser game. Recently, the company announced that they were redesigning their Edge browser, which never quite caught on. Rather than trying once...

Data Breach Hits Microsoft Customer Service Database

Over the last twelve months, we’ve heard reports from companies of all shapes and sizes that have suffered from data breaches. Many of them were caused by an act of carelessness on the part of...

Active DirectoryBeing Targeted By Malware Called TrickBot

The malware named TrickBot has some new tricks up its sleeves. Recently, a new strain of the malware was spotted in the wild with new capabilities that allow it to target the Active Directory database...

New IRS Tax Scammers Use Personal Data For Big Returns

Recently, the Department of Justice brought charges against Babatunde Olusegun Taiwo for using personal information acquired on the Dark Web. He used the information from data breaches to file...

New Ransomware Leaks Confidential Data To Public

There’s a disturbing emerging trend in the world of hackers who make use of ransomware to extort payment from companies. Increasingly, if a company won’t pay, their data that was stolen...

Microsoft Releasing New Chromium Based Edge Browser To Users

Microsoft Edge is dead. Long, live Microsoft Edge! The tech giant Microsoft has seen enormous success in a variety of markets, but it never could make a dent in Google’s dominance in the browser...

Messaging Gets Upgrade For Instagram Users

Mark Zuckerberg’s social media empire is chasing growth. It’s not hard to understand why. Facebook is the world’s largest social media platform, with more than 2.4 billion users...

New Malware Sends Offensive Texts From Your Phone

Malware tends to be at its most effective when it exists in secret. Under the radar. This is what allows malicious code to burrow deep into an infected system and capture a wide range of data...