Google Chrome users on Windows, Mac, and Linux need to install the latest update to the browser to protect themselves from a serious security vulnerability that hackers are actively exploiting. “Google is aware of reports that an exploit for CVE-2022-3075 exists in the wild,” the company said in a September 2nd blog post. An anonymous tipster reported […]
A vulnerability in the TikTok app for Android could have let attackers take over any account that clicked on a malicious link, potentially affecting hundreds of millions of users of the platform. Details of the one-click exploit were revealed in a blog post from researchers on Microsoft’s 365 Defender Research Team. The vulnerability was disclosed to TikTok […]
LastPass started notifying their users of a recent security incident where an “unauthorized party” gained access. The malicious hacker used a compromised developer account to gain access to parts of the password manager’s source code and some proprietary LastPass technical information. In a letter to LastPass users, the company’s CEO Karim Toubba explains that its investigation […]
Cybersecurity focuses on protecting electronic information on websites, networks, or devices from hackers. Through advanced technology and sophisticated processes, cybersecurity professionals, like ourselves at bva, help keep data safe and accessible. Individuals and businesses alike face cybersecurity threats. In addition, businesses need protection from unauthorized data access, both from inside and outside the organization. Strong […]
A security researcher has found a way that an attacker could leverage the macOS version of Zoom to gain access over the entire operating system. Details of the exploit were released in a presentation given by Mac security specialist Patrick Wardle at the Def Con hacking conference. Some of the bugs have already been fixed […]
Streaming media platform Plex sent out an email to its customers notifying them of a security breach that may have compromised account information, including usernames, email addresses, and passwords. Plex stated, “all account passwords that could have been accessed were hashed and secured in accordance with best practices,” however they’re still advising all users to […]
The USB Rubber Ducky is back with a vengeance. The much-loved hacking tool created byDarren Kitchen, was released to coincide with this years Def Con hacking conference. It was found that the latest editionhas a new features and is more dangerous than ever. What Is It? To the human eye, the USB Rubber Ducky looks like […]
Learn how to boost your mobile security and protect your digital identity. This tech blog will run through different forms of malicious software on your iOS or Android handset, the warning signs of a spyware infection, and how to remove such pestilence from your mobile devices if it is possible to do so. The emails […]
Malware Cyber Security Awareness: Managed Threat Protection Malware is a broad term for any type of malicious software designed to damage or exploit a device, service or network. Cyber criminals use malware to gain remote control over victims’ devices, spy on user activities, steal sensitive data they can leverage for financial gain, or use the […]