General Technology Group

Blog

Google Is Bringing Back Chrome’s Close Other Tabs Option

Not long ago, Google decided to remove the "Close Other Tabs" option from the right click context menu of their browser. While its removal didn't exactly cause an uproar among Chrome's massive ...

Employees Targeted By Hackers Posing As HR Department

Just when you think scammers couldn't get any lower, they find new ways to prove you wrong.  Recently, a new phishing scam has been spotted in the wild, this one baiting potential ...

Discord Users Be Careful Of Malware And Information Theft

Do you use the Discord chat service? If so, be advised that malware developers have been using the service to not only host various types of malware, but also to use it ...

Some iOS Apps Found To Have Clicker Trojan Malware

Recently, a survey of Apple's App Store by Wandera Threat Lab discovered more than a dozen iOS apps that have been infected with the 'Clicker' Trojan malware.  As malware goes, this variant ...

Netflix May Stop Allowing Users To Share Their Passwords

Do you have a Netflix account? If so, you know how awesome the service is.  Intuitive and easy to use, and of special interest, easy to share. In fact, password sharing among ...

New Office 365 Feature May Prevent Questionable Emails

Microsoft continues their war against spam and phishing emails with the rollout of a new feature in Office 365 called 'Unverified Sender'. It is designed to help Outlook users identify emails that ...

Malware Takes Down Services At Popular Billing Company

Billtust is major player in the US financial services sector that provides a variety of billing and payment processing services for some of the biggest financial institutions in the nation. On October ...

New Server Data Breach Reported at NordVPN

NordVPN provides a popular Virtual Private Network (VPN) service used by clients around the world. Unfortunately, they recently disclosed that a server in one of their data centers was breached back in ...

Backdoor Could Be Used On Microsoft SQL Without Detection

If you haven't heard of Skip-2.0 yet, prepare to be dismayed. Security researchers have recently discovered an undocumented (until now) backdoor designed for Microsoft SQL servers. It will allow a hacker working ...

Are Hackers Using Popular Assistant Devices To Listen To Users?

The utility of virtual assistants like Amazon's Alexa and Google Home are undeniable.  They're just genuinely handy devices to have around. Unfortunately, they're also prone to abuse and exploits by hackers and ...

Contact

General Technology GroupGeneral Technology Group Logo $$$

RSS Feed

  • RSS