Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.
As Valentine’s Day approaches, authorities have issued warnings to raise awareness of new romance techniques scammers are using this year. FBI offices in Philadelphia, Washington, Houston, and other states reminded the public to...
On February 7, a bad actor posted on Breach Forums advertising that they were selling leaked data from 20 million OpenAI users. The actor, going by “EmirKing,” provided a sample of the data...
DeepSeek, the Chinese AI startup that became the most downloaded app on the Apple App Store when released in the United States, is once again in the spotlight. A new report from NowSecure...
A rootkit might sound like something you would need to consult a dentist about. But in fact, it’s actually a form of malware that can steal your data, make a mess of your...
The takeover and use of WordPress sites to distribute malware or to phish for data are not unusual cybercriminal techniques. Most users trust WordPress sites to be safe, and a lot of sites...
Keyloggers are just 1 type of malware that threatens your computer. So it’s imperative you know what they are and how to detect a keylogger on a Mac. Fortunately, keyloggers are easy to...
DeepSeek, a Chinese AI startup, is the latest big thing in the hype surrounding AI. Low prices on its paid models and open-source versions, in addition to the controversy of Chinese AI competing...
In social engineering and phishing, credibility is everything for the attackers. Impersonating known brands and familiar contacts is a common tactic. Attackers also offer up malicious and fake links that look like the...
A new large-scale cybercriminal operation has been identified operating in the wild. This new threat campaign ran over 1,000 fake sites, impersonating WeTransfer and Reddit. The goal of the campaign is to trick...
Trojan viruses are some of the most difficult types of malware to avoid. As the name implies, a trojan virus hides itself inside something innocuous, something legitimate, then jumps out when the legitimate...