Identity security: what is it, and why is it helpful?
Proper account security not only reduces the number of cyberattacks on companies — it brings financial benefits too. What needs to be done to reap them?
161 articles
Proper account security not only reduces the number of cyberattacks on companies — it brings financial benefits too. What needs to be done to reap them?
Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
And more importantly — how to stop your passwords from being used by cybercriminals.
Why you shouldn’t trust a random period-tracking app, and what to look out for when choosing one.
Which corporate assets should be first in line for protection against cyberattacks?
We explain how attackers can steal your credentials and how you can prevent it.
How an intern can be a threat to your organization’s cybersecurity and what you can do about it.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
We analyze some typical examples of phishing bait for movie streamers.
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
Npm package UAParser.js, installed on tens of millions of computers worldwide, has been infected with a password stealer and a miner. Here’s what to do.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.