
Info-security training — with glue and scissors
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
Cybercriminals are attacking 3CX VoIP telephony software users via trojanized applications.
Microsoft plans to throttle and block email from vulnerable Exchange servers to Exchange Online.
How to store and process personally identifiable information in a company with minimum risks.
Do you edit images in Windows 11 or on Google Pixel? Due to a developer error, hidden information in cropped or edited pictures can be recovered.
Scammers are pretending to offer users tens of thousands of dollars, supposedly accumulated in an account on an “automated cloud-mining platform”.
Cybercriminals are using hijacked SharePoint servers to send dangerous notifications.
Crypto-currency has sky-rocketed in recent years, but are you keeping your hard-earned assets secure?
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
Received an attractive job offer from a stranger? Be careful! It could be a scam…
Many hacks have started during Christmas holidays. A few simple tips will reduce the chances of your company becoming the next victim.