Your IT Team has an opportunity to patch a security weakness in your Dell computers. If you facilitate them acting now, you will probably be one step ahead of attackers. The good news is Dell’s not detected any attacks in the wild. However, now bad actors have a...
Whether you use an Android or Apple phone, Apple created a short 2-minute video that explains a new privacy feature. The knowledge in the video explains privacy concerns that Android users need to know about too: Apple’s new App Tracking Transparency feature...
Hackers competing in this year’s PWN2OWN competition earned hundreds of thousands of dollars. Who paid them? The companies they hacked. But it isn’t ransomware; this is an example of bug bounty activities. Companies, including Microsoft, Zoom, and Apple...
A wonderful person who is tech-savvy sent an e-mail message yesterday explaining that she cannot trust her mom with a computer or phone anymore because scammers posing as Microsoft stole $2000 from her. Take a few moments to have the anti-scammer conversation with...
So far, it appears that more than 30,000 organizations, including small businesses, are compromised. The US National Security Council urges organizations, including small businesses, to “take immediate measures” to detect compromise. –> ONE: Ask...