1391 articles
We look at some headaches for Google and Facebook, a “hacked” Nest sending out an ICBM warning, the Girl Scouts covering cybersecurity, and more.
A new online education platform automates security awareness training for companies of any size.
A huge database of leaked e-mails and passwords surfaced in the Internet. Here’s what you should do about it.
Ex-employees can go to extremes for the sake of revenge. How to terminate a work relationship safely and securely.
Analysis of a German sex toy reveals all sorts of vulnerabilities.
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.
In this episode, Jeff and Dave discuss getting back at telesales, the latest from CES, the Town of Salem breach, and some disturbing data sales by US telcos.
The year 2018 passed under the sign of Spectre and Meltdown hardware vulnerabilities. What does 2019 have in store in this regard?
In this episode, Dave and Jeff talk New Year’s cybersecurity and privacy resolutions.
Employees going away for the winter break? We explain what to do to keep trips from turning into corporate data leaks.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Here’s how to delete or temporarily disable your Instagram account and back up your photos if you want to take a break from the social media service.
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
The 5 most common ways spammers can trick you into paying them or giving up your personal information.
Ready to delete your Twitter account? Here’s how. But you’d better back up your tweets first.
Malefactors do not need to infect your computers with malware if they can just plug their devices right into your network.
50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?
A supply-chain attack against Copay cryptowallets through an open-source library enables bitcoin theft.
We discuss what public IPs are, why you might need one, and the risks involved in using them.
Twitter cryptocurrency scams are becoming more and more advanced and convincing, with scammers using new techniques and some heavy artillery.