Is your browser safe from Spectre?

Is your browser safe from Spectre?

The Chrome, Safari, Microsoft Edge, and Firefox browsers may not be as safe as you think. Security researchers recently discovered that computer chips manufactured in the past two decades contain major security vulnerabilities. One can be used by hackers to gain access to sensitive data.

Beware Of Apps Bundled With Your Windows 10

Beware Of Apps Bundled With Your Windows 10

Have you recently purchased new laptops or computers? Don’t get too excited. A new report proves that pre-installed software such as free trials and web browser toolbars can pose high-security risks. So if you want to maximize your new investment, here are some things you might want to know:

Tavis Ormandy, a researcher from Google’s Project Zero, recently discovered that a compromised password management app, Keeper, had been installed with some versions of Windows 10. For a brief period, Keeper’s browser extension, when enabled, allowed websites to easily steal login credentials.

A keylogger found in HP laptops

A keylogger found in HP laptops

Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating you about this sneaky software and how to steer clear from it.

MTD enhances your business’s security

MTD enhances your business’s security

More and more customers are using their smartphones and tablets to browse and purchase products. That is why many businesses are adopting a mobile-first strategy and shifting their focus on improving their websites on mobile platforms. But to stand a better chance of enhancing business security, you need to adopt mobile threat detection (MTD) tactics.

Hackers exploit vulnerable Office feature

Hackers exploit vulnerable Office feature

As the world’s most popular productivity suite, Microsoft Office tends to receive much attention from cybercriminals. Generally, hackers embed malware in authentic Office files to trick users into unleashing it onto their machines. However, the most recent exploit proves to be much more dangerous than any Office hack we’ve seen.