As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
Alongside their benefits, cloud solutions for file storage and document or project management can cause many problems.
Dave and Jeff discuss how to keep personal data safe while protesting, the kerfuffle around NHS coronavirus texts, and more.
How to find an individual approach for each employee without committing to a personal mentor for everyone.
It’s hard not to worry when you don’t know where your child is. We explain how to pinpoint their location and save your nerves.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
Dave and Jeff sit down with Marco Preuss to discuss the ethics of social ratings, masked selfies, and more.
How we optimized our solution for ATM protection, and why.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Security-as-a-Service is the future of information security.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
Is your Wi-Fi a bit wobbly? Here are some easy tips to overcome the problem.
Still using Windows 7? Time to go to Windows 10 — or beef up protection.
Fear of the coronavirus is being leveraged by cybercriminals online to spread trojans and malware.
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
Listen to your cookies with the Listening Back browser extension to understand the real scale of Web tracking.
The coronavirus outbreak has forced many office employees to remain at home. Here’s what you need to keep in mind so that both you and the company stay protected.
If you own an Apple device, spend a few minutes setting up your System Location Services. You’ll protect your privacy and lengthen battery life.
50,000 printers worldwide suddenly printed a leaflet in support of youtuber PewDiePie. How can you protect your printer from hackers?
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
Be it Fortnite, League of Legends, or good old Archero, risks abound for online gaming. Learn about the threats so you can avoid them.
A relationship is a two-way street, including a professional one. This is how we make our employees feel appreciated.
Setting up your child’s first smartphone right will help keep them safe — and save you money.