News

Although the idea of TPM is familiar, the practical reasons for having one aren't. With Windows 10 slowly descending six feet under, and a TPM requirement on Windows 11 that hasn't changed, it's time ...
A new attack uses CVE-2021-41773 in Apache HTTP Server to install a cryptocurrency miner via compromised websites.
IGIS Tech Notes describe workflows and techniques for using geospatial science and technologies in research and extension.
Researchers uncover sophisticated Konfety Android malware using evil twin apps and complex evasion methods to conduct ad fraud.
Encryption, blockchain, and better user control are transforming EHR systems to keep patient data private, secure, and accessible across care networks.
Have a private document on your desktop OS? Here's how to keep it secure on Linux, MacOS, and Windows.
GuidePoint Security recently acted as a "negotiator" between an unnamed company and the group behind the Hazard ransomware. The malware infected the victim's systems, encrypting "important" files ...
Cybersecurity researchers explain the latest ransomware in Google Chrome and Microsoft Edge and how hackers can find clever ways to abuse the browsers to trick you into letting it lock up your ...
Learn how to check the File System a Drive uses in your Windows computer using the Command line, Settings, Explorer, System Information, etc.
Unlike a ransomware attack where files are encrypted, this attack did not encrypt any data—meaning the county's computer system can still operate as normal.
In addition, remember that no legit cybersecurity company would ever encrypt your files and ask you to pay for their recovery, so protect yourself — if something seems off, it probably is.