Bill Toulas

An open-source advocate who has been writing about Linux and SaaS tools for years. Having entered the fascinating world of InfoSec now, he reports on the daily news and developments in the fields of data privacy, data breaches, software vulnerabilities, phishing campaigns, malware, and all things "online danger". Contact me at "billtoulas@technadu.com"
3997 articles

YouTube Lets Users Download Videos for Offline Viewing, But There’s a Catch

YouTube is now experimenting with a video downloading feature that saves videos on the browser cache.The testing period ends on October 19,...

DDL Piracy Site ‘Snahp’ Shut Down Leaving a Message of Goodbye

DDL portal ‘Snahp’ is calling it a day after five successful years and dominance in the field.The operators left a message of...

The Norwegian Data Protection Authority Won’t Use Facebook

The Norwegian Data Protection Authority has evaluated Facebook against the GDPR and found it incompatible.Simply put, the creator and owner of a...

‘Ninja Forms’ Pushed a Very Important Update Affecting 1 Million Sites

The ‘Ninja Forms’ plugin for WordPress sites was found to be vulnerable to exploitation.The two flaws that were identified concern unprivileged information...

CISA and the FBI Publish Second Alert on the Conti Ransomware Group

American cybersecurity agencies warn about Conti attacks being on the rise again.The most commonly exploited flaws by the group are “Zerologon” and...

Researchers Discover Remotely Exploitable Flaw that Results in File Exposure on Gurock TestRail

An information disclosure vulnerability on Gurock TestRail could expose very sensitive files and data.The particular product is used by government entities and...

Is Honor Next in Line for Inclusion in the U.S. Commerce Department Entity List?

A significant number of political appointees at four U.S. agencies are pressing for a ban on Honor.Many in the U.S. feel that...

Lithuanian Ministry Bashes Xiaomi and Huawei for Undocumented Functionality

The National Cybersecurity Center of Lithuania has conducted a study to uncover undocumented functionality on Chinese phones.The brands that were looked into...

Microsoft Unearths Large-Scale Phishing Operation Involving 300,000 Subdomains

Microsoft has dug deep into ‘BulletProofLink’, after seeing one of their clients using hundreds of thousands of subdomains.The service is a premium...
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: Chrome, Edge, Firefox, Safari