Security lesson for an Instagram star (and everyone else)
Our expert David Jacoby goes live with Instagram influencer Ashley James, sharing life hacks for a secure digital life.
3876 articles
Our expert David Jacoby goes live with Instagram influencer Ashley James, sharing life hacks for a secure digital life.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
Five things to keep in mind when choosing a free PC game to play.
Keys make a clicking sound when inserted in door locks. Scientists have found a way to duplicate a key using a recording of the sound.
The DeathStalker group targets relatively small companies and their trade secrets.
We present four rules of safe trading for gamers who earn money from in-game trades.
When calculating potential losses from cyberincidents, statistical data is just as important as its interpretations.
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.
How attackers hunt for Battle.net accounts in World of Warcraft, aiming to get valuable content.
A lightbulb is all the specialist equipment Lamphone needed to eavesdrop on a conversation in a soundproofed room.
Create a digital comfort zone using any old tablets, laptops, and modems you have on hand to work from home safely.
Why reviewing the NIS directive is important for cybersecurity and cyber-immunity, in Europe and around the world.
Our technologies prevented an attack. Expert analysis revealed the exploitation of two previously unknown vulnerabilities. What you need to know.
Your online finances need proper protection. Learn how to secure your PayPal account.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.
Life has made a dramatic shift online in 2020. Our solutions will help you avoid unnecessary stress in the new reality.
You can refuse some permissions to greedy games, and they most definitely do not need these five.
Many services allow you to share your subscription with family. Here’s how popular sites handle sharing.
Our experts’ detailed analysis of the prime suspect in the ransomware attack on Garmin.
What is Zero Trust, and why is it attractive for modern business?