How to Secure Your Nest Cameras and Other Smart Home Devices
Nest Labs, an American manufacturer of various smart home devices, recently had to encourage their customers to secure their accounts, as cybercriminals gained access to quite a few of them. The thought that some... Read more
Ursnif Trojan Was Resurrected and Now It Targets Your Passwords
Sometimes certain infections do not disappear for decades. Cyber criminals manage to customize their malicious codes and use them to steal information and money over and over again. Today we would like to draw your... Read more
Hundreds of Thousands of Passwords Are Stolen from Coinmama
When we switch from one asset to another, we expect it to work properly. For instance, if you choose to use a credit card over cash, you probably have your own reasons to prefer the former. Likewise, there are users... Read more
Soon, You Won't Need to Enter Passwords If You Use an Android 7 Device. Is That Safe?
On Monday, Google announced that very soon, virtually all devices running Android 7 and newer will be FIDO-certified. This, as you'll find out in a minute, is a massive piece of news, but we appreciate that at the... Read more
Hackers Have Found a Way to Attack Drupal, and That Can Affect Your Virtual Security Too
Drupal is the world's third most popular content management system (CMS). Out of context, this doesn't sound like that big of an achievement, but when you take into account the sheer vastness of the internet, you'll... Read more
Cyber Security Tips for School Administrators and Teachers
Schools are probably the last space that comes to mind when we think about cybersecurity, and that is perhaps one of the reasons these institutions could easily receive an "F" for their cybersecurity measures.... Read more
Google Offers a Quiz to Help You Identify Phishing Scams
Can you spot when you're being phished? If you paused for a second, you might want to take a phishing quiz designed to demonstrate how to separate fake emails from legitimate ones. The questionnaire is offered by... Read more
How to Protect Your Page Document with a Password?
It's not uncommon to generate important, confidential, or highly sensitive data in word processors such as Apple's Pages. For that reason and many others, it's highly recommended by security experts that you do not... Read more
Top 6 Signs That Your Online Identity Might Have Been Stolen
If your online identity was stolen, you might not realize it right away. Hackers might take their sweet time to make a mess. Furthermore, in some cases, hackers are so stealthy that it is hard to understand what has... Read more
If You Care About Your Cloud Identity, a Good Password Is the #1 Thing to Take Care Of
While Cloud computing can provide system resources, such as storage, available on demand without the user having to play an active role in its management, the security of the Cloud is still the user's concern. In... Read more
How to Disable the iTunes Pop-Up That Keeps Asking You to Sign In
iTunes is an extremely popular media player, media library, Internet radio broadcaster, and smartphone management app created by Apple Inc. If you have an iPhone or an iPad you most likely have iTunes. The hit app was... Read more
What Is a Drive-By Download Attack and How Does It Work?
The information security industry can be a rather strange place sometimes, especially when it comes to terms and definitions. There is a lot of confusion and debate even around subjects that we should know very well... Read more