Lookalike domains and how to spot them
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
778 articles
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
How to secure chats on your phone, and why encryption alone is not enough
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
What two-factor authentication types are out there, and which ones should be preferred.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.
Proper account security not only reduces the number of cyberattacks on companies — it brings financial benefits too. What needs to be done to reap them?
How scammers can hack your YouTube channel without knowing a password and second factor.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
What happens to your digital assets after you die, and how to make sure they fall into the right hands before you do.
The pros and cons of different approaches to deploying and maintaining information security systems.
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.
Linux and ESXi-based systems are increasingly falling victim to ransomware attacks. So how can you protect your servers?
Better put them on something not very valuable or necessary. Here we explain why.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
A method of stealing data from an air-gapped system through a speaker you may not even know is there.