Saturday, August 8, 2020
Russia Tested a Space Weapon Last Week

Russia Tested a Space Weapon Last Week

This week, WIRED broke the news of a Russian military intelligence hacking campaign that dates all the way back to December 2018. The targets included government organizations and energy...

The 4 Most Secure Phones for Privacy

Recent years have shown us how insecure our smartphones can be. They pose a risk if we misplace them, as all our confidential data is stored on the device, but...
Who Pulled Off the Twitter Hack?

Who Pulled Off the Twitter Hack?

On Wednesday, an unprecedented Twitter hack saw the accounts of Elon Musk, Barack Obama, Joe Biden, Jeff Bezos, Bill Gates, Apple, Uber, and more fall into the hands of...
‘DDoS-For-Hire’ Is Fueling a New Wave of Attacks

‘DDoS-For-Hire’ Is Fueling a New Wave of Attacks

If someone wants to disrupt a website or online service—or take it down altogether—a popular method is to wallop it with a massive flood of junk traffic or bogus requests....

How Malicious Chrome Extensions Spy on Businesses

The Chrome Web Store doesn’t have a perfect defense, and malware developers exploit these weaknesses for nefarious purposes. The threat of malicious extensions, however, is growing to become a major...
15 Billion Stolen Logins Are Circulating on the Dark Web

15 Billion Stolen Logins Are Circulating on the Dark Web

After China imposed a restrictive national security law on Hong Kong, tech companies find themselves at a crossroads. Giants like Google and Facebook stopped responding to requests for user...

Apple Recommends You Don’t Cover Your MacBook Camera

If you own a MacBook you probably shouldn’t use a camera cover. And if you do cover your MacBook camera, be sure not to close your laptop. If you do,...
Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment

Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment

Any company that uses a certain piece of networking equipment from Seattle-based F5 Networks had a rude interruption to their July 4 weekend, as a critical vulnerability turned the holiday...

What Are They and Should You Use Them Together?

One frequent online privacy question regards the use of the Tor Browser and Tor Network with a VPN (a virtual private network). Both tools protect your privacy but in different...
The Worst Hacks and Breaches of 2020 So Far

The Worst Hacks and Breaches of 2020 So Far

Well, what can we say about 2020 so far? Between a deadly pandemic whose reach and scale is unprecedented in our lifetimes, the corresponding global economic downturn, geopolitical strife around...

TIPS

HOT NEWS