The FBI sent an alert last week warning about the discovery of new network protocols that have been abused to launch large-scale distributed denial of service (DDoS) attacks. The alert…
Websites increasingly ask to send notifications about their new contents and other alerts. To address this webspam mess, Microsoft Edge 84 introduces a new notification request experience called quiet notification requests. With…
One of the most advantageous qualities for a cyber threat to have it's the ability to go unnoticed. And its recent investigation found a botnet that does just that. Called…
Domain-based Message Authentication, Reporting & Conformance (DMARC), is an email authentication, policy, and reporting protocol. It builds on the SPF and DKIM protocols to improve and monitor protection of the…
A new standalone utility named Bloatbox has been released that allows Windows 10 users to debloat the operating system by removing unwanted preinstalled apps. Windows 10 ships with various universal…
O365 Offering Secure information sharing is always a challenge, and Microsoft thinks it has the right solution for organizations in highly regulated industries “Double Key Encryption uses two keys to…
Security researchers discovered a multi-platform malware framework called “MATA” that had succeeded in targeting victims worldwide. The Russian security firm explained in its analysis that the first artifacts pertaining to…
Microsoft has set the official retirement date for the insecure Transport Layer Security (TLS) 1.0 and 1.1 protocols in Office 365 starting with October 15, 2020, after temporarily halting deprecation enforcement…