Category: Apps

Category Added in a WPeMatico Campaign

Foxit PDF Reader 12.0 released

2022-06-29 By admin

Foxit Software released Foxit PDF Reader 12.0 and Foxit PDF Editor 12.0, new major versions of two of the company’s PDF flagship products. Foxit PDF Reader 12.0 is a free program to read and print PDF documents. It comes with limited support for additional functionality, such as the signing of PDF documents. Our first review […]

New Windows Phishing Method gives attackers access to cookies and more

2022-06-27 By admin

The rise of two-factor authentication added a new layer of security to the authentication process on the Internet. Attacks designed to steal user credentials are still common, but many fall short because access to user accounts is not granted without the second verification step. Users need to enter a code, use a hardware device or […]

Rapid7 research reveals which data ransomware groups seek and use for leverage

2022-06-19 By admin

When it comes to ransomware attacks, some data is more precious to ransomware groups as others. A new research study by Rapid7, Pain Points: Ransomware Data Disclosure Trends, provides insight on the data that ransomware groups value and how they use data to apply pressure. image credit: Rapid7 Double extortion attacks have increased in recent […]

Microsoft Defender for Android, Apple iOS and macOS, and Windows now available

2022-06-17 By admin

Microsoft Defender, the default security application on Windows, is now available as a standalone solution for the mobile operating systems Android and iOS, for Apple’s macOS operating system, and for Windows. image credit: Microsoft Microsoft Defender for Individuals requires a Microsoft 365 subscription: a Microsoft 365 Personal or Family subscription is required. The new application […]

Intel Firmware updates for Memory Mapped I/O security vulnerabilities

2022-06-16 By admin

Intel released new firmware updates to address Memory Mapped I/O security vulnerabilities. Intel and Microsoft published advisories this week to inform system administrators about the issues. Microsoft customers may visit the Adv220002 support page, Microsoft Guidance on Intel Processor MMIO Stale Data Vulnerabilities, for information. Intel published a support page on the company’s Security Center […]

PrivacyTests reveals how your web browser does privacy-wise

2022-06-15 By admin

All web browsers support some privacy features, some more than others, but none protect users 100% against all privacy threats; that is the quintessence of the tests that PrivacyTests runs regularly. PrivacyTests is a free website that runs tests regularly to check privacy features and protections in browsers. The organization checks desktop and mobile browsers, […]

Your browser stores passwords and sensitive data in clear text in memory

2022-06-12 By admin

Your web browser may store sensitive data, including usernames, passwords and session cookies in clear text in memory according to CyberArk security researcher Zeev Ben Porat. Most Chromium-based web browsers appear to be affected, including Google Chrome. Microsoft Edge was tested for the weakness and it was affected by it, too. A quick test on […]

GitHub’s Atom text editor will be retired in December

2022-06-09 By admin

GitHub has announced that it is sunsetting its text editor, Atom. The application, which debuted in 2011, will be retired on December 15, 2022. Atom emerged as a promising tool for code developers, and laid the foundation for the Electron framework (formerly Atom Shell). Microsoft attributes the rise of Visual Studio Code to it. The […]

Phishing: use of reverse tunnel services to avoid detection and shutdown increases

2022-06-08 By admin

Security researchers at CloudSEK have noticed an increase in the use of reverse tunnel service and URL shorteners in phishing campaigns. Cyber criminals use services such as bit.ly, Ngrok or LocalhostRun to evade detection and “launch untraceable phishing campaigns” according to the researchers. image credit: CloudSEK Phishing campaigns may impersonate legitimate websites and services to […]