Microsoft has changed a product name yet again, as Microsoft are known to do. Azure Active Directory is now Entra ID; let’s have a look at what that means. When you sign into a computer and put in your credentials, pin or password, there are several different methods the computer uses to determine whether it […]
Facebook Jackpot Project – Beware of this Scam
One of the most popular scams on Facebook is to send messages from a compromised account to that user’s friends, aiming to trick them into following dangerous links, revealing sensitive data, or sending money to the scammer. One example of this is the ‘Facebook Jackpot Project’, which claims to be a lottery in which users […]
Windows 11 Passkey Preview
As part of Microsoft’s ongoing mission to replace passwords, the latest Windows 11 Insider Build comes with added support for logging into websites and applications using your face, fingerprint, or Windows PIN. Windows 11 does this by creating and storing passkeys, which are used by the computer rather than directly typed in by the user. […]
What Does Hacking Look Like?
What does an online attack look like? We often think of online attacks as being all about advanced programs and hidden exploits in software. However, while that can be the case, often gaining access to a computer system works by tricking the user into allowing it. After all, you don’t need to pick the lock […]
Concerns About TotalAV
Recently we’ve heard concerns about TotalAV, one of the myriad antivirus and computer security programs on the market. It’s been noted that other antivirus software can in fact block the TotalAV website. It’s highly unusual for antivirus or web protection software to block other antivirus sites, as only dangerous sites are supposed to be blocked. […]
Gmail Verification Phishing
A new trick has been discovered in use by phishing scams, spoofing the verification mark in Gmail. Gmail has recently introduced blue check marks to verify trusted senders, with the intention of making it easier to spot phishing emails that are pretending to be from legitimate senders. Sending fake emails that pretend to be from […]
New Outlook Available Now
Have you seen the new version of Outlook? It’s now available for users of the desktop app via the New Outlook button in the top right corner of the window. The first noticeable difference is the change to the interface. The ribbon menus have been simplified and are quicker and easier to use. The calendar […]
.zip Domain Security Concerns
Google’s latest extension of web addresses has been met with concerns about potential attacks. People who deal in cybersecurity products have had reactions that range from eye-rolling to banging heads on desks. So, what’s this all about and why is it a problem? Google has recently launched eight new Top-Level Domains, for Dads, Grads, and […]
Atomic MacOS Stealer
Recently, Mac users have been reporting a new type of malware designed for MacOS. The malware, known as Atomic MacOS Stealer, impersonates legitimate software installation programs. When run on a computer, it displays a prompt for the user’s password, claiming to need it for installation. It then uses this password to steal data from the […]
Windows 10 End-of-Life
Microsoft have now officially announced that the End-of-Life date for Windows 10 will be the 14th of October, 2025. Windows 10 was previously expected to be the last version of Windows ever and to be continuously updated rather than replaced. Those plans have since changed, leading to the release of Windows 11 and the planned […]