Amazon Reports a Data Breach Just Before Black Friday
Multi-billion-dollar technology companies got so big not just because they presented an innovative product and did a good job of marketing it. In the online world, users need to feel safe when they're taking advantage... Read more
What is Universal Second Factor (U2F) Authentication and How to Use It to Secure Your Accounts
You might have grown tired of listening to security experts continuously talk about two-factor authentication (2FA), and about how we should all turn it on. You might be wondering why they keep banging on about this... Read more
How to Reset a HP Wireless Printer Password
You are probably well aware of the fact that laptop and desktop computers can be hacked by cyber criminals. You also know that your smartphone may be vulnerable to hacking, too. Have you ever wondered whether the same... Read more
How to Safely Create an Epic Games Account to Play Fortnite
You've probably heard of the newest video game smash hit named Fortnite. It was developed by Epic Games and first released in 2017 and has made a huge impact on the video game scene. With its colorful graphics, a wide... Read more
How to Protect Yourself from a Spear Phishing Attack
Although we usually focus on personal cybersecurity, today we would like to draw your attention to a type of cybersecurity threat that mostly targets businesses and corporations. You probably know quite a lot about... Read more
How to Safely Lock up Your Twitter Login with a Physical Security Key
Recently, Twitter announced a brand new security option. Now Twitter users can safeguard their accounts with a security key, not a virtual or digital one, but a physical key in the form of a flash drive they insert... Read more
How to Manage Your Passwords Offline with Cyclonis Password Manager
One of the biggest advantages of having a password manager is it can help you save time by logging you automatically into your social media profiles and other accounts. Consequently, many users might imagine it more... Read more
DarkGate Miner Could Put Your Passwords at Risk - How to Protect Yourself
Adi Zeligson and Rotem Kerner, two security researchers working for enSilo, recently saw that a new malware family called DarkGate was flying around. Most security products were not detecting it, so they decided to... Read more
Satellite Hacking Is a Real Thing and It Presents a Real Threat to Our Security
Have you ever wondered what would happen if all satellites suddenly just stopped working? While we do not see them floating above our heads, and some people still don't believe they exist at all (calling out all... Read more
Passwords, Addresses, and Payment Card Data Were Leaked During a Vision Direct Data Breach
Vision Direct, a large, multi-national online retailer of contact lenses, glasses, and other eyecare products recently suffered a data breach which exposed the personal information of some of its customers. This type... Read more
Top Essential Preparation Tips to Avoid a Web Security Breach
Security breaches within data management systems are a lot more common than we would like to think. We have already discussed several important security breaches topics throughout this year, including the Pentagon... Read more
How to Merge Gmail, Drive and Calendar Google Accounts
You might have two or three unique Google accounts. Maybe you had set one up for personal use only, and others were created for other purposes; for example, to handle your business or work affairs. If you decide that... Read more