Featured Blogs
Analysis of a Chrome Zero Day: CVE-2019-5786
1. Introduction On March 1st, Google published an advisory [1] for a use-after-free in the Chrome implementation of the FileReader...
How Online Scams Drive College Basketball Fans Mad
Sports fans everywhere look forward to mid-March for the NCAA men’s college basketball tournament. However, it’s not just college basketball...
Ghosts May Not Be Real but Trolls Are – Look Out for Social Media Trolls
The Cambridge Dictionary describes a troll as “an imaginary, either very large or very small creature in traditional Scandinavian stories,...
Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)
Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular...
Basic Android Apps Are Charging High Subscription Fees With Deceptive Tactics
Free apps have a lot of appeal for users. They don’t cost a cent and can help users complete tasks...
You Rang? New Voice Phishing Attack Tricks Unsuspecting Users
In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to...
How to Make Sure Spring Break Doesn’t Wreck Your Digital Rep
Spring Break 2019 is in full swing, which means high school and college kids have hit the road determined to...
809 Million Records Left Exposed: How Users Can Protect Their Data
It’s no secret that technological advancements and online threats are directly proportional to each other. So now more than ever,...
Don’t Let Thunderclap Flaws Strike Your Device
If you own a Mac or PC, odds are you’ve used your laptop’s Thunderbolt port to connect another device to...