How business e-mail compromise can cost millions
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
448 articles
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Some employees handle lots of external e-mails, running the risk of getting hit by malicious spam. We explain how to protect company systems from possible infection.
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
Jeff and Dave discuss more cameras in Kings Cross, Twitter accidentally using personal data for ads without permission, Microsoft listening in on Skype, and more.
We explain how malware steals passwords and other valuable data stored in the browser — and how to protect yourself.
We explain how not to drown in the stream of annoying browser push notifications — or even kiss them goodbye.
Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.
Apple to roll out a system of its own for quick login to websites and apps. Learn what makes it different from similar offers.
Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
No matter how good malefactors are at pretending to be the real deal, you can still spot travel phishing if you know these three simple rules.
Tempted to stream Game of Thrones free? Be very cautious: You might pay for it with your passwords and credit card details.
How to expose fake news bots based on their behavior and what insights one can get while doing this.
Tempted to find the movie Avengers: Endgame online? Be cautious: A lot of websites promise to deliver but collect your passwords and credit card details instead.
Major areas of risk for initial coin offerings that you can and should address before selling a single token.
Cybercriminals are hijacking routers to steal people’s credentials for online banking and services.
The Microsoft Office threat landscape, and the technologies that help us catch related zero-day exploits, were the focus of this talk at the SAS 2019 conference.
Introduction Sharing personal and valuable information online has become essential in modern life. A decade ago, the majority of organizations were still prepared to interact with their customers through physical
Apps that demand access to calls and SMS messaging without good reason are being kicked off Google Play. We explain what threats might arise.