If you’re like millions of other Americans, you’ve probably heard of, if not already played, Wordle. This addictively simple word game has boomed in popularity due to its virality, ad-free nature, and lack of a price tag. Unfortunately, this may change soon. In late January, it was announced that the New York Times bought Wordle…. Read more »
Is Zoom Sharing your Data?
In recent years, Zoom has become one of the most popular video conferencing platforms in the world, boasting over 300 million daily meeting participants- largely due to the sharp increase in remote working trends. Though many people find its interface user-friendly and convenient, it certainly comes with a host of privacy risks. Privacy experts have… Read more »
Here’s Why you Should Clear your Android’s Cached Data
Though cookies and cached data within your mobile phone browser can improve your browsing experience by keeping you logged into websites and saving website preferences, they can also become burdensome. Cookies are used by websites to track your browsing history so that they can more easily serve you with personalized ads- which can be an… Read more »
Files in Microsoft may not be as safe as they appear
ZLoader is a popular malware among hackers, and has recently been used to steal user credentials and other sensitive information by exploiting a vulnerability in Microsoft’s digital signature verification. So how does this affect you? Microsoft’s signature verification tool Authenticode is used to ensure that a file is legitimate and trustworthy. Researchers at Check Point… Read more »
The VA General Assembly was Attacked- What Happens Now?
On December 12th, the Virginia General Assembly was hit by a ransomware attack. Specifically, the Legislative Automated Systems branch was attacked by currently unnamed threat actors. This department essentially acts as the information technology arm of the state legislature, dealing with affairs involving publication production and distribution, computer technology information, and legislative information collection and… Read more »
The Log4j Bug is of the Most Serious Threats in Recent Years
As you may have seen on the news, on December 9th, 2021, a zero-day exploit was observed targeting Log4j, a ubiquitous open-source logging tool. In short, Log4J is a logging tool for programs to track any errors that may occur within an application. The bug (known as Log4Shell) has affected thousands of various systems across the… Read more »
Hey Google, Stop Listening!
If you’re someone who owns a smart device (or expects to receive one this holiday season), you may be concerned about the security of these devices. Apple, Amazon, and Google home gadgets can be convenient ways to consume information or communicate with others, but given these companies’ controversial histories of recording and reviewing voice data… Read more »
Is Your WordPress Website Safe?
In the past few weeks, hundreds of WordPress sites have experienced an onslaught of ransomware attacks. The hackers implement encryption notices and demand a ransom of 0.1 Bitcoin, which equates to roughly $5,500 dollars. The hackers include a countdown timer and tell the website owners that they will delete their entire website, which for a… Read more »
Top 3 Tips to Shop Safely this Holiday Season
Happy Holidays! We hope your season is filled with family, friends, and delicious food. As the holidays approach, you’ll no doubt be thinking about partaking in Cyber Monday deals to prepare for the holidays. In 2020 alone, 72.4 million people shopped on Cyber Monday. Unsurprisingly, as Cyber Monday sales have increased over the past few… Read more »
TSA Fights Back Against Wave of Transportation Cyberattacks
The Transportation Security Administration (TSA) recently announced that it will soon implement new cybersecurity requirements on the railroad and airline industries. To many, this comes as no surprise, as critical infrastructure has been subject to a slew of high-profile cybersecurity attacks this past year. The new directives will all but waive existing voluntary cybersecurity measures… Read more »