We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Kids use social networks and IMs a lot, and don’t keep in mind that the “internet remembers all”. How to reduce the digital footprint of your tiny beloved ones (even if they’re taller than you).
How to protect a company’s reputation from illegal use of its name on the internet.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
A few words on why desktop applications based on the Electron framework should be approached with caution.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
Minecraft mods downloaded from several popular gaming websites contain dangerous malware. What we know so far.
Why scammers are more likely to target kids than hardcore gamers, how they do it, and what they want to steal
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
Why the Windows system time can suddenly change, and how to stop it from happening.
Why criminals want to hack your website, how they might use it in new attacks, and how to stop them.
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
Some thoughts on what PC software patches should be prioritized and why.
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
Explaining an issue in popular PC and server CPUs in simple terms.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
Does saying “hyphen” five times to your iPhone really crash it — or is that just another myth?
Once again, very serious vulnerabilities have been found in Apple operating systems. Don’t delay updating to iOS 16.4.1 and macOS 13.3.1. Please note that updates are also available for iOS 15 and macOS 11 and 12.
These seven tips will help you get maximum gaming performance from your PC while retaining a high level of protection.
If you receive a message saying your Facebook account has been blocked for copyright violation, don’t panic. It’s most likely just another phishing scam.
Harmless toy or a way to phish for personal data?
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
You’re spending way more on subscriptions than you expect. How to take control of them and save money?
Web services and apps are part and parcel of the modern learning process — both online and offline. But they’re often insecure and pose a threat to your child’s personal data. How to stay safe?
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
The new school year is in session. Here are some tips for keeping your kids safe both on their devices and online.