
Received an email with a QR code? Watch out!
Examples of how QR codes in emails are used for phishing.
51 articles
Examples of how QR codes in emails are used for phishing.
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
In its February update, Microsoft buried Internet Explorer once and for all. Or did it? We investigate what really happened.
Why you should update to the latest version of Google Chrome, Microsoft Edge, Opera, Yandex Browser, Vivaldi, Brave and other Chromium-based browsers.
Cybercriminals are using hijacked SharePoint servers to send dangerous notifications.
It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components — from Windows and Office to Defender and Azure.
Microsoft has released patches for more than 140 vulnerabilities, some of which need to be closed as soon as possible.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
Time to update Windows! Microsoft has released patches for several dozen vulnerabilities, one of which cybercriminals are actively exploiting.
Microsoft patches 128 vulnerabilities in a list of products, including Windows and its components.
Microsoft patches more than a 100 vulnerabilities in Windows 10 and 11, Windows Server 2019 and 2022, Exchange Server, Office, and Edge browser.
Remembering 2021’s most interesting infosec events — in memes and tweets.
The Open Management Infrastructure agent, with four vulnerabilities, is being automatically installed on virtual Linux machines on Microsoft Azure.
An unpatched vulnerability in the MSHTML engine is enabling attacks on Microsoft Office users.
Misconfigured applications built with Microsoft Power Apps leave millions of personally identifiable information entries exposed.
Phishers are using Google online services to take over Microsoft online service accounts.
A zero-day vulnerability in Microsoft Windows may already have been exploited.
Jeff and Dave discuss Facebook and COVID-19, the latest on the Microsoft Exchange vulnerabilities, deepfakes, and more.
Jeff and Dave discuss deepfakes, doxing, ransomware, and the Microsoft Exchange Server attack.
Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network.