242 articles
Website names in the ZIP and MOV domains are indistinguishable from file names. How will this affect IT systems, and what will threat actors do?
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
Information security measures are far more effective when supported by top management. How to get this support?
A new generation of chatbots creates coherent, meaningful texts. This can help out both cybercriminals and cyberdefenders.
Received an attractive job offer from a stranger? Be careful! It could be a scam…
Many hacks have started during Christmas holidays. A few simple tips will reduce the chances of your company becoming the next victim.
Here are some simple tips to protect your funds from fraudsters, phishers and carders when shopping online.
Scammers are sending e-mails under the guise of government agencies to coax personal data and money out of users.
We explain how attackers can steal your credentials and how you can prevent it.
The most effective protection is increasing employees’ awareness, and it’s up to HR to maintain it.
How scammers lure YouTube users to a fake website where a purported bug lets them exchange Bitcoin at an excellent rate.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Here’s how phishers extract phone numbers and credentials from users of Wise.
We explain how scammers steal cryptowallets through phishing.
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.