Information security measures are far more effective when supported by top management. How to get this support?
Here are a few tips on how to make your Untappd profile as private and secure as possible.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
Researchers have found vulnerabilities in the desktop client of the Signal messenger. Let’s see how dangerous they really are.
A new generation of chatbots creates coherent, meaningful texts. This can help out both cybercriminals and cyberdefenders.
Received an attractive job offer from a stranger? Be careful! It could be a scam…
Episode 282 includes ChatGPT malware, smart device failures and naughty chat programs
A few words about why Telegram isn’t as secure as its developers boast.
Why it’s important to think about what data you share online, how to prevent being doxed, and what to do if you fail.
What to do if your secret messenger isn’t secret enough.
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
Miscommunication between a business and its information security service can lead to unnecessary losses. Today we try to work out how to overcome the communication barrier.
Everybody knows that we should prepare ourselves for a “quantum future”, but it was expected to come about in 10-20 years’ time. Is a breakthrough possible this year?
And more importantly — how to stop your passwords from being used by cybercriminals.
The BlueNoroff APT group has adopted methods to bypass the Mark-of-the-Web mechanism
Stealing data from an isolated network by manipulating the voltage switching converter.
Many hacks have started during Christmas holidays. A few simple tips will reduce the chances of your company becoming the next victim.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
How things are privacy-wise on the social network Poparazzi.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
How to check for hidden cameras in a hotel room or rented apartment.
The most common ways PayPal users are cheated out of their money through spam, phishing, and various kinds of fraud on the platform.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
In this second part of the series, we’re going to dive deep into Ethereum and its novelties: smart-contracts, DAOs and NFTs.
Everything you’ve always wanted to know about crypto on the whole, and NFTs in particular, and also why I’m not a fan of such tech, to say the least.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
Six simple steps for personal digital security in 2023.
How to know if you’re facing a scam: we identify all the red flags in a recent scam that deployed a fake cryptocurrency exchange
Why you shouldn’t trust a random period-tracking app, and what to look out for when choosing one.
Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.