Category: Security

Dec 28
Microsoft: State-Sponsored Hackers Are Exploiting Log4j Vulnerability

The critical Apache Log4j 2 vulnerability is paving the way for state-sponsored…

Dec 28
Google Project Zero Goes Deep on FORCEDENTRY Exploit Used by NSO Group

Google's Project Zero team has published a technical analysis of the FORCEDENTRY…

Dec 28
Scraping the Barrel: Meta Expands Its Bounty Program

Meta has expanded its bug bounty program to reward security researchers who discover…

Dec 28
Ransomware Attack May Leave Many Americans Without Pay This Christmas

We are fast approaching the end of the year, but there's a real chance many Americans…

Dec 28
Is This Facebook Email a Fake?

If you work for a company of any size that is even remotely online, chances are good…

Dec 28
Private Internet Access VPN Review

When you switch it on, a VPN encrypts all your internet traffic and pipes it off to a…

Dec 28
Joker Malware Resurges in App Downloaded 500,000-Plus Times

Pradeo has discovered the Joker malware, which has been active for at least two years,…

Dec 28
Best Cheap VPNs for 2022

While there are a few excellent free VPNs, most will run you more than $10 per month.…

Dec 28
The Best Free VPNs for 2022

Though you'll likely have to pay to get all the premium features of the best VPN…

Dec 28
IPVanish VPN Review | PCMag

Using a virtual private network (or VPN) can help improve your privacy by making it…