What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
Would Johnny Mnemonic’s cybersecurity be plausible in the real 2021?
Jeff and Dave discuss Clubhouse and security issues as well as the latest in the battle between Australia and Facebook.
Facebook lets you manage the data it collects from third-party websites and apps. Here’s how.
How to minimize the consequences of a corporate ransomware attack.
Dave and Jeff talk about health app vulnerabilities, iMessage concerns, ransomware attacks, and more.
How, and why, cybercriminals attack accounts on hosting provider sites.
Jeff and Dave discuss surging cryptocurrency, Tesla’s Bitcoin investment, a compromised water treatment plant, and more.
Scammers are using fake news sites to lend legitimacy to their Bitcoin and Ethereum offers on Discord.
How to set up and use dating apps safely and privately.
Gut-wrenching stories of in-game cheating told by actual participants.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
Cybercriminals are disguising ransomware as a beta version of Cyberpunk 2077 for Android.
The world’s first show for gaming moms is on YouTube. Its purpose: breaking stereotypes about video games (and about parents).
Ahead of its release, scammers are offering free Cyberpunk 2077 downloads, but they’re really after your data.
More than 20 apps on Google Play that promised cool Minecraft mods turned out to be malicious.
Scammers have created hundreds of phishing pages with fake item giveaways, aiming to steal PUBG mobile account credentials.
Seven safety and security rules to keep in mind when buying games and in-game items.
In not-so-loving memory of Adobe Flash.
CD Projekt confirms attack on internal systems. Hackers claim to have downloaded Cyberpunk 2077 and The Witcher 3 source code, and demand ransom.
Hackers are actively exploiting a dangerous vulnerability in Google Chrome. With Chrome 88.0.4324.150, Google has patched the vulnerability.
When the creators of Fonix ransomware abandoned their malicious ways and published the master key, we made a decryptor out of it.
Cybercriminals are sending phishing e-mails to hijack access to ESP accounts.
Why the computers in human resources are especially vulnerable, and how to protect them.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
These seven tips will help you get maximum gaming performance from your PC while retaining a high level of protection.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
Tips to help buyers and sellers on eBay.
Decided to invest in cryptocurrency? Read our guide to avoid the most common rookie mistakes and not lose money.