How to Find Your Router Password and Change It Right Away
It happens all the time. You decide to get a new router, but it has to be set up according to your ISP's network settings so that you can share your broadband network to more than one device. Usually, the manufacturer... Read more
Beware of Schemers Introducing Themselves as BT Group (British Telecom) Operators
If you’re reading this entry, you probably know what BT is, but for those who stumbled upon this entry accidentally, let us just tell you that BT Group (formerly British Telecom) is a British multinational... Read more
TripAdvisor Resets Compromised Passwords. What Do Users Need to Do?
Last week, some TripAdvisor users received an email notification related to their account security. It could very well be the perfect example of a good idea that's not very well executed. The email shows that... Read more
How Hackers Compromised Cambridge University's Security to Spread Malware via a Firefox Zero-Day Vulnerability
What exactly is the biggest problem of modern online security? Advanced hacking tools? Badly written software applications? Vendors that don't do enough to protect users' data? You could argue that technically, all... Read more
New Netflix Scam Alert – Phishers Go After the Streaming Platform's Users in Ireland
For the last few weeks, Irish Netflix users have been targeted by cybercriminals who are eager to get their hands on other people's personal information. It's difficult to estimate how big the wave of phishing emails... Read more
Beware of Fake Hotel and Flight Deals If You Do Not Want Your Vacation Ruined
Did you find a way cheaper deal for your dream hotel or received an offer via email? Before taking what might seem to be an excellent opportunity to save on your vacation costs, you should ask yourself whether the... Read more
Scammers Use Instagram's 'Verified Account' Status to Steal Users' Credentials
What do the (usually) blue tick badges placed next to the names of some Instagram, Twitter, and Facebook profiles do? Technically, they indicate that the social network has verified the account owner, but for many... Read more
Guide to Easily fix System Image Backup Failed in Windows 10-8-7
Making sure you have a ready and serviceable backup of all your data and settings is often crucial to users. Unfortunately, while Windows Image Backup may appear to be a very basic function, but is, in fact, a rather... Read more
What Are Productivity Apps and How to Use Them Safely?
Have you ever thought about using a productivity app? Never heard of them? We actually think that you have, just perhaps you weren’t aware that this one particular product is a productivity app. There are all sorts of... Read more
New Steam Scam Promises a Free Game and Steals Users' Credentials
Most of you know very well that when you're offered something for nothing in the real world, you should be more than a little careful. Online, however, things are a bit different. Far too many people are used to the... Read more
How to Get Your Google 2FA Backup Codes and How to Use Them
We've talked about Two-Factor Authentication/Verification (2FA) before. As you know you can add 2FA to your Google account for extra security. That way you'll need to enter a second code in addition to your password... Read more
Scammers Abuse Google Calendar to Target Gmail Users
Last month, researchers from Kaspersky saw 'multiple cases' of hackers trying to trick people into parting with their financial information. Judging by the screenshots Kaspersky published, the attack is mostly... Read more