Monday, September 25, 2023
Home Tags PC Mag

Tag: PC Mag

PC Mag

The Best Parental Control Software for 2020

Parenting styles run the gamut and so do the features in parental control and monitoring utilities. We've tested the top hardware- and software-based services to help you choose the right one for your family.
PC Mag

The Best Free Antivirus Protection for 2020

Windows Defender is improving, but you still shouldn't rely on Windows 10's security tools as your sole means of protection. Many free third-party security apps are more effective at keeping you safe. We've tested 17 no-cost services to help...
PC Mag

Qustodio

Parental control app Qustodio is a highly configurable, easy-to-manage tool for keeping track of your child's activity on Windows, Mac, iOS, and Android devices, though it comes at a premium price.
PC Mag

Malware Steals Data By Adjusting Screen Brightness

Malware on an air-gapped computer can transmit data like Morse code by changing screen brightness in a way that's invisible to the naked eye but easily recorded with a camera.
PC Mag

Hackers Pose as Wall Street Journal Reporter to Phish Victims

Watch out for suspicious interview requests. 'The main focus of this phishing campaign was stealing email account information of the victims, and finding information about their contacts/networks,' the cybersecurity experts at Certfa Lab warned on Wednesday.
PC Mag

Google Photos Videos Were Shared With Strangers

Google's Takeout service was designed to let people download their data, but accidentally sent videos from Google Photos accounts to strangers.
PC Mag

New Coronavirus Strain? Nope, Just Hackers Trying to Spread Malware

The hackers have been using files and emails that warn about a new coronavirus strain to trick users into opening them. Doing so can secretly deliver malware to the victim's machine.
PC Mag

Avast to End Browser Data Harvesting, Terminates Jumpshot

'As CEO of Avast, I feel personally responsible and I would like to apologize to all concerned,' wrote Ondrej Vlcek following a PCMag-Motherboard investigation into the privacy risks around the data harvesting.
PC Mag

Avast Defends Data Harvesting, Plans to Get Users to Agree to It

On Tuesday, Avast responded to a PCMag-Motherboard investigation into the company's browser history collection practices, saying it was entirely legal. Avast users should expect to see a prompt from the antivirus products, asking them to consent to the data...
PC Mag

Net Nanny

Net Nanny boasts customizable web filters along with solid screen time and app blocking features, but it's a bit pricey and suffers from a sub-standard web interface.
PC Mag

Save 30 Percent on Keeper, Never Click 'Forgot Password' Again

The password-fatigued masses will be pleased to find Keeper's new 30 percent off deal, which brings it down to $20.99 per year from its typical $29.99.
PC Mag

The Cost of Avast's Free Antivirus: Companies Can Spy on Your Clicks

Avast is harvesting users' browser histories on the pretext that the data has been 'de-identified,' thus protecting your privacy. But the data, which is being sold to third parties, can be linked back to people's real identities, exposing...
PC Mag

Oops! Microsoft Briefly Leaked 250M Customer Support Records

The records involved conversation logs between Microsoft support agents and customers across the globe, dating back to 2005. Most of the records were redacted of customer contact information, but not all.
PC Mag

After Bezos Phone Hack, UN Points Finger at Saudis, Calls for Probe

According to a recent forensic analysis, a WhatsApp account from the Saudi Crown Prince Mohammed bin Salman allegedly sent government-bought spyware to Bezos' phone in May 2018, two UN human rights experts said on Wednesday.
PC Mag

Report: Hack of Amazon's CEO Phone Tied to Saudi Prince

The stunning allegation reportedly comes from a forensic analysis Amazon CEO Jeff Bezos commissioned to determine the culprit behind the hack, which resulted in his private photos ending up in the hands of the National Enquirer.
PC Mag

Report: Apple Dropped Plans for Fully-Encrypted iCloud Backups

Six sources confirmed Apple changed its mind on end-to-end encrypted backups two years ago following an FBI complaint and concerns users could lose access to their own data.
PC Mag

Feds Seize WeLeakInfo.com for Selling Access to Stolen Data

The FBI seizes the internet domain to WeLeakInfo.com, a site that was cataloging billions of records, such as email addresses and passwords, from more than 10,300 data breaches at various companies and service providers.
PC Mag

Bad Flaw in Windows 10 Also Affects Chrome Browser

Security researchers are demonstrating how you can use the Windows 10 flaw, CVE-2020-0601, to spoof the trusted digital certificates for official website domains on Google's Chrome browser. These same certificates can warn you about hacking attempts.
PC Mag

Google's Advanced Protection Expands to Phone-Only Users

Google has made it easier to join the company's Advanced Protection Program, which is designed to stop the most sophisticated hackers from breaking into your Gmail account. Before you needed two security keys to enroll. Now you just need...
PC Mag

The Best Password Managers for 2020

Still using your kid's birthday as your universal password? You're heading toward trouble. With a password manager, you can have a unique and strong password for every secure website. We've evaluated two dozen of the best password managers to...
Infosecurity Magazine

Almost US 900 Schools Breached Via MOVEit

National Student Clearinghouse reveals more details of incident

Don’t Get Burned by CAPTCHAs: A Recipe for Accurate Bot Protection

Traditional CAPTCHAs, such as reCAPTCHA, no longer protect online businesses adequately. Real users hate them. Bots bypass them. It's time to upgrade.
The Hacker News

New Report Uncovers Three Distinct Clusters of China-Nexus Attacks on Southeast Asian Government

An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the region over extended periods of time. "While this activity occurred around the same time and in some instances even simultaneously...
The Register

T-mobile exposes some customer data – but don’t call it a breach

PLUS: Trojan hidden in PoC; cyber insurance surge; pig butchering's new cuts; and the week's critical vulns Infosec in brief  T-Mobile has had another bad week on the infosec front – this time stemming from a system glitch that...

Cisco Disrupts Observability & Cybersecurity Markets with Splunk Acquisition

Cisco's acquisition of Splunk benefits Cisco's ongoing b shift towards more software and subscription-based services, but will cause churn in the market,