Featured Blogs
Microsoft’s June Patch Kills Potential CFG Bypass
After applying Microsoft’s June patch, we noticed some interesting changes that prevent a security bypass of Windows’ Control Flow Guard...
Millennials Choose Convenience Over Security When it Comes to Information Sharing
For better or for worse, we’ve ended up amidst a society built on information sharing. There are a number of...
Millions Affected by Malware Attributed to Android Barcode-Scanning App
We’ve all come to a realization that we don’t go anywhere without our phone. It’s a utility that helps us...
Millions of Android Devices Hit With CopyCat Malware
Time and time again, we’ve seen Android malware make its way through mobile devices around the world. Now, a new...
Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt
Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential...
Millions of Facebook Users May Have Unknowingly Shared Posts Publicly
Facebook, Facebook, Facebook – between malware leveraging Facebook Messenger to send phishing messages, to apps on the platform mishandling customer...
Millions of iOS and Android Users Could Be Compromised by Bluetooth Bug
Similar to smartphones and computers, Bluetooth is one of the modern-day pieces of tech that has spread wide and far....
Millions of Verizon Customers’ Phone Numbers and Accounts PINs Exposed
When your phone is experiencing an issue, you call support, ask for technical tips, and provide personal information when necessary....
Millions Possibly Affected by Newly Discovered Stegno Malvertising
When it comes to deception, cybercriminals have many options at their disposal. There’s phishing, where crooks posing as an authority...
Mirai Botnet Creates Army of IoT Orcs
This post was based on analysis by Yashashree Gund and RaviKant Tiwari. There is a lot of speculation in the...
Mirai, BrickerBot, Hajime Attack a Common IoT Weakness
This blog post was written by Rick Simon. We know that devices in the Internet of Things make enticing targets...
Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?
We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for that elusive picture...
Missing Hotel Room Key? Try Your Phone
If you are like me, there are times when you will misplace your hotel key. Times when you’re switching a...
Misuse of DocuSign Email Addresses Leads to Phishing Campaign
DocuSign, which provides electronic signatures and digital transaction management, reported that email addresses were stolen by an unknown party on...
Mobile and Digital Payments: Worth the Risk?
Thanks in part to the convenience that our mobile devices provide for us, much of the world operates now on...
Mobile and Phishing – Why It’s More Dangerous
Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure...
Mobile Attacks: The Golden Age for Hackers
It’s fun to re-watch shows like “Friends” and realize that so many plot lines are irrelevant today because of technology...
Mobile Authentication vs. Mobile Banking and Commerce, Part II
Mobile authentication grants access to online banking – but it’s not exactly mobile banking. The main difference is that mobile...
