 
						22
JunAdobe Acrobat may block antivirus tools from monitoring PDF files
Security researchers found that Adobe Acrobat is trying to block security software from having visibility into the PDF files it […]
 
						21
JunRecent Windows Server updates break VPN, RDP, RRAS connections
This month’s Windows Server updates are causing a wide range of issues, including VPN and RDP connectivity problems on servers […]
 
						17
Jun730K WordPress sites force-updated to patch critical plugin bug
WordPress sites using Ninja Forms, a forms builder plugin with more than 1 million installations, have been force-updated en masse […]
 
						16
JunNew cloud-based Microsoft Defender for home now generally available
Microsoft has announced today the general availability of Microsoft Defender for Individuals, the company’s new security solution for personal phones […]
 
						16
JunAnker Eufy smart home hubs exposed to RCE attacks by critical flaw
Anker’s central smart home device hub, Eufy Homebase 2, was vulnerable to three vulnerabilities, one of which is a critical […]
 
						15
JunMicrosoft June 2022 Patch Tuesday fixes 1 zero-day, 55 flaws
Microsoft’s June 2022 Patch Tuesday, and with it comes fixes for 55 vulnerabilities, including fixes for the Windows MSDT ‘Follina’ […]
 
						14
JunFirefox now blocks cross-site tracking by default for all users
Mozilla says that all Firefox users will now be protected by default against cross-site tracking while browsing the Internet. This […]
 
						13
JunWiFi probing exposes smartphone users to tracking, info leaks
Researchers at the University of Hamburg in Germany have conducted a field experiment capturing hundreds of thousands of passersby’s WiFi […]
 
						10
JunApple and Google “hold all the cards,” watchdog says
The UK wants to investigate Apple and Google’s market power in mobile browsers and Apple’s restrictions on cloud gaming through […]
 
						9
JunEmotet malware now steals credit cards from Google Chrome users
The Emotet botnet is now attempting to infect potential victims with a credit card stealer module designed to harvest credit […]
