Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
A few words on why desktop applications based on the Electron framework should be approached with caution.
You’re spending way more on subscriptions than you expect. How to take control of them and save money?
Web services and apps are part and parcel of the modern learning process — both online and offline. But they’re often insecure and pose a threat to your child’s personal data. How to stay safe?
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.
Why the Windows system time can suddenly change, and how to stop it from happening.
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
Why criminals want to hack your website, how they might use it in new attacks, and how to stop them.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
Minecraft mods downloaded from several popular gaming websites contain dangerous malware. What we know so far.
Why scammers are more likely to target kids than hardcore gamers, how they do it, and what they want to steal
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
Some thoughts on what PC software patches should be prioritized and why.
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
Explaining an issue in popular PC and server CPUs in simple terms.
Gadgets to help protect employees’ devices against hackers and other threats.
What caused a mass vulnerability in VPN clients, and how to keep them working.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
Does saying “hyphen” five times to your iPhone really crash it — or is that just another myth?
Once again, very serious vulnerabilities have been found in Apple operating systems. Don’t delay updating to iOS 16.4.1 and macOS 13.3.1. Please note that updates are also available for iOS 15 and macOS 11 and 12.
These seven tips will help you get maximum gaming performance from your PC while retaining a high level of protection.
If you receive a message saying your Facebook account has been blocked for copyright violation, don’t panic. It’s most likely just another phishing scam.
Harmless toy or a way to phish for personal data?
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
The new school year is in session. Here are some tips for keeping your kids safe both on their devices and online.
A new school year, and a familiar headache for parents: kids’ cybersecurity. In this first post, we discuss how to protect your children’s gadgets from cyberthreats.
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
Detailed tips for those who want to make money from streaming without feeding the trolls.