Dangerous letters for small online retailers
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
454 articles
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
One explanation of phishing success lies in a known psychological effect.
How to protect your Instagram account and personal photos from prying eyes.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.
Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Some employees handle lots of external e-mails, running the risk of getting hit by malicious spam. We explain how to protect company systems from possible infection.
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
Jeff and Dave discuss more cameras in Kings Cross, Twitter accidentally using personal data for ads without permission, Microsoft listening in on Skype, and more.
We explain how malware steals passwords and other valuable data stored in the browser — and how to protect yourself.
We explain how not to drown in the stream of annoying browser push notifications — or even kiss them goodbye.
Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.
Apple to roll out a system of its own for quick login to websites and apps. Learn what makes it different from similar offers.
Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
No matter how good malefactors are at pretending to be the real deal, you can still spot travel phishing if you know these three simple rules.
Tempted to stream Game of Thrones free? Be very cautious: You might pay for it with your passwords and credit card details.
How to expose fake news bots based on their behavior and what insights one can get while doing this.
Tempted to find the movie Avengers: Endgame online? Be cautious: A lot of websites promise to deliver but collect your passwords and credit card details instead.