Google Is Adding Verification Policy For Online Ads

Google Is Adding Verification Policy For Online Ads

Recently, Google announced they were making some important changes to their rules governing online ads. They’re adding verifications that they normally reserve for political advertisements,. This step is in a bid to combat what many industry experts are calling...
Microsoft Stopped Hackers Using GIFs To Access User Data

Microsoft Stopped Hackers Using GIFs To Access User Data

Microsoft Teams (which is the company’s Enterprise chat app) isn’t all business. Like most other chat apps, it allows those who use it to send amusing animated Gif images. Unfortunately, that proved to be problematic. Recently, researchers from CyberArk...
Some Smart WiFi Linksys Routers May Need A Password Reset

Some Smart WiFi Linksys Routers May Need A Password Reset

If you have a home network, odds are good that you use a Linksys router. In fact, it’s a brand that a great many small and medium sized businesses rely on as well. With that in mind, be advised that recently, the company locked user accounts on its Smart WiFi...
Agent Tesla Malware Steals WiFi Passwords From Infected Users

Agent Tesla Malware Steals WiFi Passwords From Infected Users

A few new variants of the Agent Tesla info-stealer malware have been spotted in the wild and should be on your radar if they’re not already. The new variants are more dangerous than previous versions of the malware. They now sport a module that enables them to...
Gmail Blocks Millions Of COVID-19 Phishing Emails Daily

Gmail Blocks Millions Of COVID-19 Phishing Emails Daily

Google’s popular Gmail service has been busy. In a typical day, the company’s email system blocks more than a hundred million phishing emails. During the last week alone, the company reports that their system saw a massive spike in phishing emails related...
Hackers Stopped With Help of Microsoft Digital Crimes Unit

Hackers Stopped With Help of Microsoft Digital Crimes Unit

Microsoft’s Digital Crimes Unit (DCU) recently played an instrumental role in taking down a botnet made up of more than 400,000 devices. A botnet is a tool that hackers use to invade systems. The botnets were rented out to a variety of groups to conduct DDoS...