BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
Dave and Jeff sit down with Marco Preuss to discuss the ethics of social ratings, masked selfies, and more.
How we optimized our solution for ATM protection, and why.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
Security-as-a-Service is the future of information security.
Common tax-related scams that fraudsters use to fool thousands of taxpayers each year and how to protect yourself from falling victim to them.
This week Dave and Jeff take a look at a leaked Google Doc that the NHS would like to take back, unemployment scams in the US, a Star Wars–Top Gun mash-up, and more.
Another reason not to share everything online.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
A long time ago in a galaxy far, far away, a lone Mandalorian warrior suffered from cybersecurity issues, both other people’s fault and his own.
Payment terminals and ATMs in remote locations require a special approach to security.
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Is your Wi-Fi a bit wobbly? Here are some easy tips to overcome the problem.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
Tools and approaches to help you get some online privacy.
Be it Fortnite, League of Legends, or good old Archero, risks abound for online gaming. Learn about the threats so you can avoid them.
A relationship is a two-way street, including a professional one. This is how we make our employees feel appreciated.
Setting up your child’s first smartphone right will help keep them safe — and save you money.
How to protect your Instagram account and personal photos from prying eyes.