OpenSea Warns Users Of Phishing Attacks From Data Breach

Are you a fan of NFTs?  If so, you've probably heard of OpenSea, which is the largest marketplace for non-fungible tokens. If you have an account there, be aware that recently the ...

Microsoft Office And Google Docs Sync For Offline Use

Recently, Google announced a small but significant change to Google Docs.  Now, if you have enabled offline access for files you have stored on your Google Drive, the system will auto-sync any ...

S3 Ep95: Slack leak, Github onslaught, and post-quantum crypto [Audio + Text]

Latest episode - listen now! (Or read the transcript if you prefer.) Read Full Article Here

APIC/EPIC! Intel chips leak secrets even the kernel shouldn’t see…

If you've ever written code that left stuff lying around in memory when you didn't need it any more... we bet you've regretted it! Read Full Article Here

Secret Twitter Accounts Are Not What You Think

Do you have a Twitter account?  Have you been patting yourself on the back while assuming that your identity was a secret, allowing you to ply the waters of Twitter in anonymity? ...

Malware Is Targeting Small Office And Home Office Routers

Researchers at Lumen's Black Lotus Labs recently spotted evidence of a highly sophisticated and tightly targeted campaign aimed at SOHO (small office/home office) routers across both Europe and North America. Based on ...

Slack admits to leaking hashed passwords for three months

"When those invitations went out... somehow, your password hash went out with them." Read Full Article Here

New Version Releases For iOS Devices

Apple has recently announced a new string of updates for their OS family including iOS, iPadOS 15.6, macOS 12.5, watchOS 8.7 and tvOS 15.6. Bear in mind that the next version of ...

How To Easily Create An Efficient Workspace

The more efficient you are, the more effective you are.  That's true whether you're working from the office or from home. Fortunately, most office environments lend themselves to being efficient, so there's ...

Traffic Light Protocol for cybersecurity responders gets a revamp

Traffic lights make a handy global metaphor for denoting the sensitivity of cybersecurity threat data - three colours that everyone knows. Read Full Article Here