Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.
As the post-pandemic world continues to adopt remote and hybrid work models, employers are seeking ways to keep an eye on their staff when they aren’t physically present in the office. This can...
Botnets have been around since the early days of the internet and remain one of the world’s most threatening cybersecurity issues. A cyber botnet has only one basic requirement: an internet connection. Once...
Despite being created about ten years ago, NanoCore is one of the most popular, effective, and dangerous remote access trojans (RAT). But what exactly is NanoCore? Why is it still relevant? And what...
Google has announced new privacy and security tools for users. Specifically, the company has enhanced and updated two features: Safe Search and Results about you. Both updates are designed for users to stay...
The new macOS Sonoma, expected to be released in September or October this year, is loaded with new privacy and security features. From major updates to Safari Private Browsing to the new Lockdown...
SentinelOne has released a report on a new infostealer targeting Apple’s latest OS release, macOS 14 Sonoma. The malware can not only steal passwords and browser data but can also empty crypto wallets. This...
On the eve of the 2016 United States presidential election, a scandal broke involving a devastating hack of the Democratic National Committee (DNC). The news caused the ground to shift under Hillary Clinton,...
The first ransomware attack was registered in 1989. Back then, attackers encrypted files and held them hostage in exchange for payment that had to be mailed to a P.O. box. It was not...
On July 19, 2023, CheckPoint Research released its findings on a new malware known as BundleBot. The report comes after CheckPoint keeping a close eye on this new threat and investigating it for several months....
The Wi-Fi icon has become a symbol of instant connectivity. But just as you can easily connect to wireless networks, so can hackers, as most Wi-Fi networks are open and unsecured. In this...