Posted on July 9th, 2019
Do not adjust your screen. The logo above is displayed upside down as a comment on Zoom.
Zoom Video Communications (NASDAQ ZM) is a provider of video conferencing and IP phone services. Zoom Meeting Client apps have found their way onto Macs and ...
Posted on February 5th, 2019
A "Never-Ever" is something no one should ever do. "Never Evers" are those sometimes unwritten rules about things that matter most to us; love, family, work, and computing.
Topping my list of computing "Never-Evers" is this: never, ever fall for...
Posted on January 9th, 2019
Watch out for phony PDF reader apps.
Even mainstay free Adobe Reader can be compromised by cybercriminals and posted to sketchy software download sites visited by the unwary.
Myriad off-brand free PDF reader apps are often malicious schemes to ...
Posted on May 28th, 2018
An analysis by Cisco’s threat intelligence division found that hundreds of thousands of routers, from a range of manufacturers, were infected by the malware linked to the hacking group Fancy Bear. Credit Ozier Muhammad/The New York Times
By Louis ...
Posted on April 23rd, 2018
Devious code is sending people to fraudulent quiz and contest pages, so ignore that "lucky winner" notice and run a security scan.
Pop-ups claiming to offer prizes to Amazon customers are part of a surge in malicious advertising. Credit The New Y...
Posted on January 31st, 2018
Google has cracked down on Chrome extension malware—but the bad guys are finding ways to stay ahead of their defenses.
Lily Hay Newman, January 30, 2018
You already know to be wary of third-party Android apps, and even to watch yo...
Posted on January 15th, 2018
By J. D. Biersdorfer
Jan. 15, 2018
Q. Is it safe to install the Windows patch for these new Spectre and Meltdown bugs? Do they affect Linux? (And who names these security flaws, anyway?)
A. Meltdown and Spectre, the two recently announced securit...
Posted on January 14th, 2018
By Mike Matthews, iMore
14 Jan 2018
It happened again last week.
A friend was telling me she had convinced her mother to get a Mac laptop.
"But what is this MacSweeper?" she said, with a hint of puzzlement in her voice.
She meant, of course, MacK...
Posted on November 8th, 2017
Our readers are a savvy bunch who aren't likely to be taken in by an online scam—but we've all got those friends and relatives we worry about. Here's our definitive guide to helping them stay safe online.
Photo from Futurama.
When training your lo...
Posted on November 8th, 2017
Most of us know spam when we see it, but seeing a strange email from a friend—or worse, from ourselves—in our inbox is pretty disconcerting. If you've seen an email that looks like it's from a friend, it doesn't mean they've been hacked. Spammers ...
Posted on October 17th, 2017
From MacWorld, by Liviu Arsene Oct 17, 2017
This malware’s striking characteristic: its ability to drop a payload individually designed for Windows, Linux, and Mac OS running devices.
Macs are the go-to device for professionals and high-level of...
Posted on October 12th, 2017
Big-three consumer credit bureau Equifax says it has removed third-party code from its credit report assistance Web site that prompted visitors to download spyware disguised as an update for Adobe’s Flash Player software.Image: Randy-abrams.blogsp...
Posted on October 11th, 2017
Kaspersky Lab’s products require access to everything stored on a computer in order to scour it for viruses or other dangers. Credit Sergei Ilnitsky/European Pressphoto Agency
It was a case of spies watching spies watching spi...
Posted on October 6th, 2017
There is no end to the free PDF readers, media players, and nifty widgets available for instant download that claim to do what your computer can already do, but do it cooler. Really?
The big, green, inviting button beckons even alert users to sus...
Posted on September 21st, 2017
September 21, 2017 TechCrunch by Natasha Lomas
Malware that piggybacked on CCleaner, a popular free software tool for optimizing system performance on PCs, appears to have specifically targeted high profile technology companies and may have been a...
Posted on September 10th, 2017
Home Latest Tech Insider Enterprise ...
Posted on July 12th, 2017
The alert below appears on HP’s various support and web store sites. Similar alerts also appear on websites of Apple, Microsoft, Google, Facebook, and others.
HP’s alert can apply to calls from any strangers claiming to be security or technical ...
Posted on May 2nd, 2017
What’s with those app update installer icons on your computer? Do you really want them?
When we first download or update Chrome or Firefox browsers, Java, Skype, Adobe Reader, Adobe Flash Player and other apps their installers usually go to the ...
Posted on April 19th, 2017
From Apple Support posted April 19, 2017
Use these tips to avoid phishing scams and learn what to do if you think your Apple ID has been compromised.
Scammers use phishing and other types of social engineering to try to trick you into sharing pe...
Posted on April 3rd, 2017
Microsoft Malware Protection Center Blog posted April 3, 2017
Millions of users continue to encounter technical support scams. Data from Windows Defender SmartScreen (which is used by both Microsoft Edge and Internet Explorer to b...
Posted on January 26th, 2017
From Microsoft | TechNet Microsoft Malware Protection Blog posted January 26, 2017
The Gmail phishing attack is reportedly so effective that it tricks even technical users, but it may be just the tip of the iceberg. We’re seeing similarly simple ...
Posted on March 10th, 2016
March 9, 2016 The Wall Street Journal
The Security & Privacy system preferences pane in the Mac’s OS X allows you to set safeguards for downloaded apps.
It’s a bit of a nightmare. Over the past weekend, a Mac app called Transmission was infecte...
Posted on March 7th, 2016
by Sarah Perez on TechCrunch.com March 7, 2016
Apple has shut down what appears to have been the first, fully-functional ransomware targeting Mac computers. This particular form of cyber threat involves malware that encrypts the data on your pe...
Posted on February 18th, 2016
Thomas Fox-Brewster is a staff writer at Forbes.com covering crime, privacy and security in digital and physical forms.
Across the world, hackers are taking control of networks, locking away files and demanding sizeable ransoms to return data to ...
Posted on February 18th, 2016
Brad Moon is a contributor to Forbes.com
Opinions expressed by Forbes Contributors are their own.
It seems as though we can’t go a day without news of another big data breach. Already this year, we’ve had a reported data leak for 320,000 Time Wa...