If you’re like many non-profits, you may benefit from the Microsoft Non-profit program. This endeavor has enabled nearly 400,000 organizations worldwide to access top-notch technology at discounted rates. However, there are going to be some major changes to the software donation program that will take place on April 4, 2022 that you should be aware… Read more »
Blog
Are you being tracked by an Apple AirTag?
Understanding the Risks of Apple AirTags Apple’s AirTag devices have gained popularity since their release in 2021. Designed to help users track items like keys or bags, these tracking devices have also been misused for nefarious purposes. Some individuals have slipped AirTags into someone’s bag or car without their consent. This secret tracking poses a… Read more »
Cyberattacks on US Infrastructure likely to Increase Amidst Russia Sanctions
Cybersecurity Attacks Expected to Rise Cybersecurity experts and the FBI warn that cyberattacks against U.S. citizens and companies will likely increase. This comes after Western nations imposed sanctions on Russia following its invasion of Ukraine and related malware attacks. Escalating Tensions and Cyberwarfare Tensions have risen further after the U.S. and its allies blocked some… Read more »
How to Play Wordle for Free after it’s Behind a Paywall
The Rise of Wordle If you’re like millions of other Americans, you’ve probably played or at least heard of Wordle. This simple yet addictive word game skyrocketed in popularity thanks to its viral appeal, ad-free experience, and zero cost. However, that might change soon. The New York Times Acquisition In late January, the New York… Read more »
Is Zoom Sharing your Data?
Zoom’s Popularity and Privacy Concerns Zoom has become one of the most widely used video conferencing platforms, with over 300 million daily meeting participants. The surge in remote work has significantly contributed to its widespread adoption. While many users appreciate its user-friendly interface and convenience, Zoom presents several privacy risks. Past Security Issues Privacy experts… Read more »
Here’s Why you Should Clear your Android’s Cached Data
Though cookies and cached data within your mobile phone browser can improve your browsing experience by keeping you logged into websites and saving website preferences, they can also become burdensome. Cookies are used by websites to track your browsing history so that they can more easily serve you with personalized ads- which can be an… Read more »
Files in Microsoft may not be as safe as they appear
ZLoader Malware Exploits Microsoft Vulnerability How Hackers Use ZLoader to Steal Sensitive Information Hackers favor ZLoader malware for its ability to steal user credentials and other sensitive data. Recently, cybercriminals have exploited a vulnerability in Microsoft’s digital signature verification to deploy ZLoader effectively. How This Threat Affects You Microsoft’s signature verification tool, Authenticode, ensures that… Read more »
The VA General Assembly was Attacked- What Happens Now?
Ransomware Hits Virginia General Assembly On December 12th, ransomware struck the Virginia General Assembly, targeting the Legislative Automated Systems branch. This department, the IT arm of the state legislature, manages tasks like publishing, computer technology, and legislative information. Upon discovering the attack, the department quickly shut down most servers to contain the spread. A top… Read more »
The Log4j Bug is of the Most Serious Threats in Recent Years
The Log4Shell Exploit On December 9, 2021, a zero-day exploit targeting Log4j, an open-source logging tool, came to light. Log4j helps programs track application errors. The exploit, called Log4Shell, impacts thousands of systems globally, including those of major vendors like Cisco, VMware, Twitter, Amazon, Google Cloud, IBM, and Microsoft. Hackers have likely exploited this vulnerability… Read more »
Hey Google, Stop Listening!
If you own a smart device—or expect to receive one this holiday season—you may be worried about its security. Devices from Apple, Amazon, and Google offer convenient ways to access information or communicate. However, these companies have faced criticism for recording and reviewing voice data without users’ consent. A bit of skepticism is reasonable. In… Read more »