Update Windows now to protect against this dangerous exploit

Keeping your devices and software up to date is among your first defense against security breaches.

We’ve recently seen an uptick in critical Chrome, Windows, iOS, Firefox and Zoom updates. The fixes address zero-day vulnerabilities and security flaws that hackers can exploit to launch attacks. Tap or click here for detailed instructions on updating your systems.

Microsoft just patched a Windows zero-day vulnerability that hackers have been actively exploiting. If you haven’t updated recently, you should do so as soon as possible.

They call it Follina

On May 30, Microsoft posted a warning about a zero-day vulnerability known as Follina and classified as CVE-2022-30190. Hackers can exploit the remote code execution vulnerability to run arbitrary code with privilege from apps such as Microsoft Word.

The attacker can then install programs, view, change, or delete data or create new Windows accounts.

That original post had a workaround for the vulnerability, but on June 14, Microsoft issued a fix for the June 2022 cumulative Windows Updates. Microsoft added this statement to its Security Update Guide entry for CVE-2022-30190:

“Microsoft strongly recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.”

Update your Windows now

Why wait? You need to ensure you have the latest version of Windows to protect against this vulnerability.

How to update Windows 10:

  • Tap or click the Start button Settings Update & Security > Windows Update. Then select Check for updates.
  • If an update is available, select Download and install now.

Continue reading

Ukraine Invasion: What it means for you and your family if Russia retaliates against the US

Russia invaded Ukraine on Thursday, launching a coordinated attack by land, sea and air. Joseph Borrel, the EU foreign affairs chief, put it simply: “These are among the darkest hours of Europe since the Second World War.” Countries globally are condemning Russia, weighing in with sanctions to protest, and America’s voice is one of the loudest.

Continue reading

Hackers are selling old routers to spies

Open/download audio

They’re using these routers for denial-of-service (DoS) attacks and spamming inboxes. Meanwhile, a man’s been cyberstalked by a former roommate — nightmare stuff. Plus, Microsoft got hacked, and OpenAI is launching a search engine.

Give yourself extra time before your next flight: After attacks on Hezbollah, aviation authorities in Lebanon banned travelers from boarding planes or checking luggage with pagers and walkie-talkies. Expect the TSA to increase their screening for explosives (paywall link).

30 grams of xylitol

Made healthy people more likely to have blood clots. The sugar sweetener common in keto and low-carb treats may increase the risk of heart attack and stroke. That amount is common for a single scoop of keto ice cream or a few low-sugar cookies, btw. Read those ingredients!

Hackers have a clever new way to steal your login details - Don't open this PDF!

Adobe has an extensive suite of apps used by businesses and regular internet users. One of the most popular is Acrobat Reader, which allows you to view PDF files. Here’s a safe way to sign PDFs and convert them to different formats.

Continue reading

Can't find your favorite candies to hand out on Halloween? Blame ransomware

Cybercriminals employ all sorts of strategies to ply their crooked trade. Ransomware attacks are just what they sound like. An attacker gains access to your files through your computer or network and locks them down. They demand payment — the ransom — in exchange for releasing your files.

Continue reading

🚨 Don’t buy pills on eBay: Some SKALD diet pills on the platform tested positive for meth in a random drug screening. Watch out for brands like PhenQ, Govvi WOW! and Phentamene XT, too; they could be fake or tainted with banned ingredients that cause heart attacks … or worse. Talk to your doc instead.

1 in 10 executives

Say their company has faced a deepfake attack. This year, one worker joined a deepfake video call with his “teammates” that was so convincing, he wired $25 million to the scammers. Companies going through IPOs, mergers or reorgs are most at risk.

A hospital's responsibility for ransomware attacks

Open/download audio

When ransomware cripples a hospital, it’s not the building or equipment that suffers — it’s the patients who are denied. 

600,000 routers

Destroyed in 72 hours by a mysterious hacker. In October 2023, thousands of Windstream internet customers reported their routers had suddenly gone dark. A new security report reveals it was a targeted attack using a single piece of malware anyone can find online. The who and why are both still a mystery.

Never get between a mom and her babies: So sad and so avoidable. A moose killed a 70-year-old man who got too close trying to photograph her calves in Homer, Alaska. If you see a moose with laidback ears, raised hairs on its hump or licking its lips, it’s about to attack. Run for your life and get behind something solid. Better yet, always leave wildlife alone.

Apple’s iPhone spyware problem is worsening: Attacks mostly against journalists, activists and government representatives have been reported in over 150 countries. Common red flags: Faster-than-usual battery drainage, high data usage and unexpected shutdowns. If you’re a journalist or activist, or if you work for the government, turn on Lockdown mode.

Mac attack: A new macOS malware called “Cuckoo” is targeting older Intel-based Macs and newer models with Apple chips. It steals passwords and takes over your system. It’s spreading via websites and apps that convert streaming music into MP3s. Stay safe: Use TotalAV to protect your tech — it’s just $19 for a year.

Spies want in on your router

Open/download audio

Is yours at risk? Hackers’ new side hustle is charging Chinese and Russian spies and scammers for access to old home routers so they can launch denial-of-service (DoS) attacks. Plus, Google blocks romance writer, worst airlines for luggage, and Microsoft gets hacked.

FBI Chinese hacker warning: The FBI warns Chinese hackers are gearing up for a massive attack against our U.S. infrastructure. Under the “Volt Typhoon” mission, these hackers have already infiltrated our telecom, energy and water sectors in an attempt to wreak havoc and induce panic. Now, they’re just waiting for “the right moment” to strike big time. Get this: For every cybersecurity pro the FBI has, there are at least 50 Chinese hackers. Have a just-in-case plan. It’s important.

How to find and remove duplicate photos

Storage space comes at a premium, whether it’s price or simply having room for all of your important stuff. Your phone, computer, tablet, laptop and other devices all have limited storage space and if you want more, be prepared to shell out for it.

Continue reading

Critical flaw puts billions of smartphones at risk of attack – What you need to know

Device security flaws can be a major pain in the neck for both consumers and manufacturers. If one device is affected, thousands of others are also in danger. That’s why it’s in the best interest of device-makers to push out patches and updates as often as possible.

Continue reading

Critical Bluetooth flaw exposes your phone to malware - here's how to patch it

Computer hacks are old news. Phone hacks, regardless of operating system, are the hot new challenge for ambitious criminals. On the whole, it’s trickier to crack a smartphone OS, that’s why it’s such an issue when a major exploit is found.

Continue reading

Two-factor authentication is vulnerable to this new type of attack

Two-factor authentication has long been touted as one of the best ways to make sure you are staying secure online. But recently it seems that this tried-and-true way to stay safe has been beaten by hackers. They are using this knowledge to break into people’s accounts and steal their information. Here’s how to make sure you are safe from this hack.

Continue reading