How to React to and Report Online Fraud
Whether you’re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.
223 articles
Whether you’re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.
OpenID and OAuth are protocols responsible for those “Login with Facebook” and “Authorize with Google” buttons you see on almost every site nowadays. Of course, there is a hack for that™, but you don’t need neither panic nor change your password. Read on for our simple action plan.
We begin our synopsis of this week by looking forward to next week when Microsoft will – at long last – discontinue its support of the once ubiquitous, forever vulnerable,
You have a particularly high chance of encountering fake news on April Fool’s Day. In addition to joking headlines of mainstream media outlets, you can encounter a link to dedicated
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
There is a common belief that Apple operating systems are well protected against cybercriminals. This belief used to be true, but Apple users are quickly becoming an attractive target for
When surfing the Internet we click hundreds of links in search results and on web resources. How can you identify whether links are malicious or not? How can you be
Massive multiplayer online games — MMOGs — have become hugely popular in recent years, which means, unsurprisingly, that they’ve become big targets for attackers. These games create alternative universes, often
These now-familiar square images you see in ads, magazines and posters have proved to be the easiest and cheapest way to link the real and the virtual worlds. All you
The first thing you want to be aware of when discussing security features on Google’s Chrome browser is that many of the best options aren’t built into the browser, but
In recent years, cybercriminals have stepped up their efforts to get hold of users’ money. Credit card numbers, login details for online banking, passwords and codes – all this and
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and