A scary backdoor is out there right now, targeting Windows, Linux, and macOS. This SysJoker malware is so frightening because it’s very good at evading detection, giving it the ability to do damage without the user noticing….
The first computers packing Microsoft’s Pluton security processor arrive in 2022 thanks to AMD’s Ryzen 6000 laptop CPUs. If you haven’t heard of the technology, Pluton promises improved hardware security by walling off sensit…
Another antivirus is getting in on the crypto hype. This time, it’s Avira. The antivirus just happens to be owned by the same company as Norton 360, which is also offering a crypto miner.
The Oculus Browser on the Oculus Quest 2 keeps a record of every website you visit on its History page. If you don’t clear it, people who use your headset after you can see which sites you’ve been viewing. Here’s how to clear…
Your Oculus Quest 2 comes with the Oculus Browser, which will let you browse the web privately without keeping a record of your browsing history. Here’s how to quickly enable private browsing on both the Quest 1 and Quest 2 h…
Norton has an interesting feature tucked inside its Norton 360 antivirus subscription—a cryptocurrency miner. It’s not turned on by default, but it is installed as part of your antivirus package whether you want it or not….
There are multiple VPN protocols, and which protocol a VPN uses has a big influence on how it functions. Some protocols are a lot better than others. Thankfully, finding the best VPN protocol is easy as there are only a few c…
LastPass has been dealing with a rather unfortunate situation. Some users received alerts that unauthorized individuals were logging into their LastPass account with their master password. It turns out, these alerts were sent…
Several LastPass users claim that they’re receiving emails from the company about unauthorized login attempts using their master passwords. Fortunately, LastPass has responded to the issue, and the password manager says it ha…
DuckDuckGo had a big year in 2021. As it turns out, the search engine saw massive growth despite being in a battle against Google, a brand so entrenched in the search world that people refer to searching as “Googling.”…
Apps you install on Android often collect data about you and your activity for the app developers and their affiliates. With a tool developed at the University of Oxford, you can see those trackers and even stop them in their…
Tired of remembering or managing long lists of passwords? Good news: the future is passwordless. You might even be able to go passwordless (or near-enough) for some services you already use right now.
A huge number of cyberattacks are exploiting a dangerous flaw called log4shell in the log4j software. One top U.S. cybersecurity official was quoted in Cyberscoop saying that is one of the most serious attacks of her career, …
There’s a massive Java vulnerability called Log4Shell that has companies worldwide frantically spending their Friday afternoons working on fixes, and Minecraft is one of the many vulnerable Java-using programs….
Social media services collect data about their users, which is then used for targeted advertising or sold directly to third parties for various purposes. But what if a platform like Facebook collected information about non-us…
You’ve seen technology gurus tape over their webcams, but a kill switch is a more elegant solution to the very real privacy threat posed by devices like cameras and microphones. The question is: do you need one for your priva…
Online scams are as old as the internet, and people keep falling for the same old techniques. But with the global semiconductor shortage raging on and making hardware difficult to find, scammers have found a new lease of life…
Verizon emailed customers about a new program called “Custom Experience,” which is the company’s excuse to collect all kinds of data on you to help it provide more relevant information. That’s all well and good, but the progr…
Hackers are increasingly using an RTF template injection technique to phish for information from victims. Three APT hacking groups from India, Russia, and China, used a novel RTF template injection technique in their recent …
In what is a grim reminder to be careful what you install, a new bunch of Android apps have been downloaded more than 300,000 times and are stealing bank account information and draining accounts.
IPVanish and ExpressVPN are two of the biggest names in the VPN industry. ExpressVPN is one of the best VPNs out there, while IPVanish went from being one of the most well-known names to a smaller player. Let’s compare the tw…
Security cameras come with a wide variety of features, so it can be challenging to pick the one you want. You need to think about what you plan on using your camera for and then browse for a suitable option….
NordVPN and IPVanish are two big names in the VPN industry, and you can’t help but run into both of them when shopping for the best VPN for your needs. To help you make the choice, we’re going to compare the two of them on al…
Another massive data breach has occurred, and this time it’s hitting GoDaddy customers. In total, 1.2 million accounts were affected by the attack, leaving many people concerned about the safety of their website’s private inf…
Online, privacy and security go hand-in-hand. They’re often used interchangeably, but that isn’t quite right. While privacy and anonymity might lend themselves to better security, they aren’t the same as security—they’re on…