Category: Articles
-
Window 11 sends alerts when typing passwords in insecure Applications
Enhanced Phishing protection in Windows 11 Windows 11 comes with an advanced feature of enhanced protection. When users type their passwords in insecure applications this feature warns them. Typing passwords in spreadsheets, word processor, and text editor are enough for attackers to steal the passwords and get access to the important data. According to Sinclaire…
-
Microsoft Exchange servers are under attack for phishing via OAuth App
Attackers get access to Microsoft Exchanges Servers and use them for phishing emails. Attackers adopt various ways of getting access to the important information of users. Attack through Oauth App is one of the attempts to hijack systems to send phishing emails to the users. According to Microsoft 365 Defender team, the attackers attack those…
-
Why are cybercriminals using more Domain Shadowing?
There have been 12,197 cases reported for domain shadowing between April 2022 and June 2022. Domain Shadowing is a subdomain of DNS hijacking. In domain shadowing, the hijacker compromises the DNS of a legitimate domain to use in malicious activities but will never compromise the legitimate DNS that already exists. The attacker uses these subdomains…
-
DELL Strengthens its vProxy
Upstream Operating Software got fixed vProxy is an online appliance that is used to recover and protect VMware virtual machines There have been detected two critical bugs in vProxy to which Fell has issued patches. This way they have found a fix against bugs for their upstream Linux operating system. vProxy inherits bugs from the…
-
Google and Meta are in the news for privacy violation
A million dollars penalty was fined by South Korea According to reports, Google is fined A$ 74 million and Meta is fined A$ 33 million for a privacy violation on Wednesday 14th Sep, 2022. The privacy panel reported that Google and Meta didn’t take permission before using the data for analyzing and collecting information regarding…
-
What do hackers do for more realistic phishing attacks?
Sock pockets, a new campaign by hackers. Iranian group of hackers is using phishing techniques where these hackers use multiple email accounts and personas that target into thinking people the conversation is real. Hackers send an email while CCing some other email, that is under their control, and start a fake conversation. The researchers named…
-
What costs do businesses pay due to fake reviews?
Fake reviews can cause huge financial losses to businesses. According to studies, fake reviews cause $152 billion in direct damage annually. There are reports where companies bear a loss of millions of dollars due to fraudulent online reviews. This not only impacts businesses financially but also takes up employees’ headspace and time. It has been…
-
Digital Wallets to be tackled by Linux Foundation
Open wallet’s number one priority is interoperability Linux Foundation is working on the idea of opening a new entity with the name Open Wallet Foundation. This will help users to create digital wallets on an open-source platform. The idea is to create a multi-purpose and secure open-source engine that helps in building interoperable wallets. The…
-
What’s new about Microsoft word?
Edit, Review, and View documents in Microsoft word. There is a new update in Microsoft word. This new feature has brought Microsoft word to the forefront from the back. The new feature allows users to (@mentions) tag people in their shared documents. The new feature will also allow users to assign, track and create tasks…
-
Microsoft: This Outlook upgrade will restore some much-loved classic graphics
Outlook appearance will get a simplified and classic do-over. Thanks to a new upgrade, Microsoft Outlook users will soon be able to modify their layout with a nod to the past. The email service will soon feature two additional types of “ribbons” – the navigation bar that displays choices and tools. The two new ribbon…