alerts

AppWizard
March 2, 2026
A 63-year-old resident in Solon, Ohio, lost over a million dollars to a scammer posing as a cryptocurrency investment guru. The scam began with a friendly outreach on Facebook, which transitioned to WhatsApp for private conversations. Over several months, the victim was convinced to invest in what he thought was a legitimate opportunity. This incident reflects a broader trend, as the FBI reported that Ohioans aged 60 and older lost over a million to fraud in 2024. Meta Platforms is enhancing tools to detect and disrupt fraudulent activities on its platforms, including new warnings for screen sharing requests on WhatsApp. In the first half of 2025, Meta removed eight million accounts suspected of scams and shut down 21,000 pages impersonating legitimate businesses. Warning signs in the Solon case included initial contact from a stranger, a quick shift to cryptocurrency discussions, and unusually high promised returns.
Winsage
March 1, 2026
Cybercriminals are exploiting a legacy feature in Windows File Explorer, specifically the WebDAV protocol, to distribute malware and bypass traditional security measures. Despite Microsoft deprecating native WebDAV support in November 2023, it remains active on many systems. Attackers use WebDAV to deceive victims into executing malicious payloads by sending links that connect File Explorer directly to remote servers, avoiding web browsers and their security warnings. They employ methods such as direct linking, URL shortcut files, and LNK shortcut files to deliver exploits. The primary objective of these campaigns, which surged in late 2024, is to deploy Remote Access Trojans (RATs), with 87% of Active Threat Reports involving multiple RATs like XWorm RAT, Async RAT, and DcRAT. These campaigns predominantly target corporate networks in Europe, with many phishing emails written in German and English. Attackers use short-lived WebDAV servers hosted on Cloudflare Tunnel demo accounts to obscure their infrastructure. Security analysts are advised to monitor unusual network activity from Windows Explorer and educate users to verify addresses in File Explorer.
Tech Optimizer
February 26, 2026
Avast Antivirus has introduced advanced AI tools, enhanced browser protection, and new privacy features in the U.S. market. It offers real-time malware protection, phishing shields, and Wi-Fi scanning. Avast's product lineup includes a free version, a premium security plan, and Avast One, catering to different user needs. Independent lab tests show Avast ranks highly in malware blocking, competing with brands like Bitdefender and Kaspersky. However, users should be cautious of upselling practices and data collection concerns. The free version provides strong protection, while paid plans offer additional features like VPN and advanced ransomware protection. Avast is accessible on various platforms, and pricing fluctuates due to promotions. Users are advised to assess their needs and be mindful of renewal rates before subscribing.
AppWizard
February 25, 2026
An innovative Android application called Nearby Glasses, developed by Yves Jeanrenaud from Darmstadt University of Applied Sciences, alerts users about nearby smart glasses using Bluetooth Low Energy (BLE) technology. The app detects manufacturer identifiers associated with smart eyewear, including Ray-Ban Meta AI Glasses, and notifies users when such glasses are in proximity. However, it may produce false positives due to other Bluetooth devices from the same manufacturer. The app's launch coincides with growing concerns about non-consensual recording, highlighted by incidents like a viral altercation on a New York subway involving smart glasses. Meta has stated that their glasses have an LED light that indicates when recording is occurring, but this indicator can be disabled. Legal experts warn that while video recording in public is generally allowed, collecting biometric data raises privacy concerns, and various state laws may require consent for audio recordings. Recent courtroom incidents have also underscored the contentious nature of wearable technology.
BetaBeacon
February 25, 2026
- The feature called Notification history allows devices to keep a log of all alerts received. - Users can retrieve missed alerts even after clearing them away with Notification history activated. - The system maintains a chronological order of notifications. - Users can enable Notification history by navigating to Settings, selecting Notifications, and choosing Notification history to toggle it on. - Notification history can help users customize their notifications for a more tailored experience. - Activating Notification history can alleviate the fear of losing important information.
AppWizard
February 25, 2026
A new Android application called Nearby Glasses, developed by Yves Jeanrenaud, alerts users when smart glasses are nearby by scanning for specific Bluetooth signatures. It is available on the Google Play Store and GitHub, functioning by identifying Bluetooth advertising frames from brands like Meta and Luxottica Group S.p.A. The app aims to address privacy concerns associated with smart glasses, particularly in light of reports about facial recognition technology being integrated into these devices. Jeanrenaud created the app to provide a countermeasure to surveillance technology, though he warns it may generate false positives with other devices that emit similar signals. The market for smart glasses is expanding, with companies like Google, Samsung, and Apple expected to enter the market.
Tech Optimizer
February 24, 2026
A cyber operation is targeting users of Huorong Security antivirus software through a typosquatted domain, huoronga[.]com, which mimics the legitimate site huorong.cn. Users who mistakenly visit the counterfeit site may download a file named BR火绒445[.]zip, which contains a trojanized installer that leads to the installation of ValleyRAT, a remote access trojan. The malware employs various techniques to evade detection, including using an intermediary domain for downloads, creating Windows Defender exclusions, and establishing a scheduled task for persistence. The backdoor facilitates activities such as keylogging and credential access while disguising its operations within legitimate processes like rundll32.exe. Attribution points to the Silver Fox APT group, and there has been a significant increase in ValleyRAT samples documented in recent months. Security measures include ensuring software downloads are from the official site and monitoring for specific malicious activities.
Search