In the past, virtual private networks were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too.
Based on a new risk assessment process, some apps that want to use Google's identity services might need to undergo a review
The new ransomware program is distributed via mass email spam sent by the Necurs botnet
The vulnerabilities could allow hackers to modify routers' settings through cross-site request forgery attacks
All SHA-1 certificates that chain back to publicly trusted certificate authorities will be blocked, but enterprise and self-signed certificates won't be affected.
Microsoft fixed critical vulnerabilities in Windows, Office, Edge, Internet Explorer, and its malware protection engine
Attackers can exploit the vulnerability to compromise Windows systems running affected Microsoft security products, including Windows Defender and Microsoft Security Essentials.
Mac users who downloaded the app earlier this month may have their computers infected with the Proton Trojan program