Computer Security

With Pinterest's Growing Popularity, Hackers' Interest Grows as Well screenshot

With Pinterest's Growing Popularity, Hackers' Interest Grows as Well

Even if you do not use Pinterest on a daily basis, or hardly at all, you might have an account on this image-sharing, social-networking platform. Founded in 2009 in San Francisco, USA, it already has 367 million... Read more

July 3, 2020
'Sign in With Apple' Now Available on More Platforms: How to Use the Feature Safely screenshot

'Sign in With Apple' Now Available on More Platforms: How to Use the Feature Safely

If you use Apple products and you are not completely satisfied with Sign in with Google or Sign in with Facebook, you might be happy to hear that you can now Sign in with Apple. You might not be able to use this... Read more

July 2, 2020
Hackers Have Found Easy Targets in Healthcare Organizations as 75% of Them Worldwide Have Been Affected screenshot

Hackers Have Found Easy Targets in Healthcare Organizations as 75% of Them Worldwide Have Been Affected

It can be hard to grasp the scale of cyber infections if you do not get exposed to them directly. However, the continuous trend allows us to assume that the number of data breaches will continue to grow, and certain... Read more

July 1, 2020
Cybercriminals Exploit Contact-Tracing Efforts for Profit screenshot

Cybercriminals Exploit Contact-Tracing Efforts for Profit

We're living through a pandemic that shows no sign of slowing down. COVID-19 has gripped the world. In an attempt to slow the spread of Coronavirus, many countries have introduced contact-tracing efforts. Once you... Read more

June 18, 2020
Cyberstalking Is a Growing Issue, but There Are Steps You Can Take to Protect Yourself screenshot

Cyberstalking Is a Growing Issue, but There Are Steps You Can Take to Protect Yourself

Cyberstalking is a serious crime that is punishable by law, but sometimes, proving that someone is stalking can be very difficult. In fact, some victims might not even realize that someone is stalking them for a long... Read more

May 21, 2020
Hackers Are Exploiting Both Facebook and PayPal to Create a Superscam screenshot

Hackers Are Exploiting Both Facebook and PayPal to Create a Superscam

Imagine this… A real-life friend contacts you via Facebook’s Messenger to ask you for a favor. They are having issues linking their PayPal account to their payment card, and now they cannot transfer the funds to their... Read more

May 18, 2020
Three Threats You Might Face When Working Remotely screenshot

Three Threats You Might Face When Working Remotely

Working remotely sounds like a master plan: you don’t need to roll out of bed to scramble to your commute, and you get to spend your time in your home environment. However, if you’ve been forced into working from home... Read more

July 3, 2020
What Is a Whaling Attack? How It Works and How to Prevent It screenshot

What Is a Whaling Attack? How It Works and How to Prevent It

As we learn how to defend ourselves against cyberattacks, cybercriminals come up with new tactics and malicious applications. At some point, they came up with new types of phishing attacks like spear-phishing that can... Read more

July 2, 2020
Beware of 'Three Mobile' Phishing Scams That Extract Credit Card Details and Passwords screenshot

Beware of 'Three Mobile' Phishing Scams That Extract Credit Card Details and Passwords

Hutchison 3G UK Ltd., better known as Three UK, is a British telecommunications company that has been in business since 2003. In 17 years, the company has earned the trust of 8.8 million active customers, and it is in... Read more

July 1, 2020
A New Study Finds That 54% of Participants Did Not Know How to Check for Password Breaches screenshot

A New Study Finds That 54% of Participants Did Not Know How to Check for Password Breaches

An informative new study that surveyed 15 thousand consumers across a whopping 23 countries recently found that a bit more than half of internet users have no clue how to check if their passwords have been hacked,... Read more

June 17, 2020
Cybersecurity Experts Discover Over 9 Billion Compromised Login Credentials From 640 Unique Data Breaches screenshot

Cybersecurity Experts Discover Over 9 Billion Compromised Login Credentials From 640 Unique Data Breaches

We all know that we can do better with how we manage passwords, handle data breaches, or deal with account hijacking after hackers steal login credentials. Unfortunately, although we have the knowledge, we do not... Read more

May 20, 2020
Usenext and Usenet.NL Disclose Data Breaches but Cannot Decide Who's to Blame screenshot

Usenext and Usenet.NL Disclose Data Breaches but Cannot Decide Who's to Blame

On April 29, 2020, two major Usenet service providers almost simultaneously disclosed security breaches to their systems. Interestingly enough, the messages that UseNeXT and Usenet.nl put out were nearly identical,... Read more

May 6, 2020
Coronavirus Offers an Opportunity for Schemers to Perform Credit Card Fraud, Experts Say screenshot

Coronavirus Offers an Opportunity for Schemers to Perform Credit Card Fraud, Experts Say

It doesn’t matter whether you’re still cooped up at home or if you’re already frolicking back and forth, your usual routine back to normal. You must’ve felt the effects of COVID-19, and we’re going to have to live... Read more

July 2, 2020
Your Virtual Security Could Depend on the Version of the Web Browser You Use screenshot

Your Virtual Security Could Depend on the Version of the Web Browser You Use

Do you ever stop to think about what web browser you use and whether it is safe? Most likely, you do not put much thought into that. After all, when you open the browser, all you need is that it shows bookmarked... Read more

July 1, 2020
100,000 Hichip Security Cameras in UK Are Not So Secure, as It Turns Out screenshot

100,000 Hichip Security Cameras in UK Are Not So Secure, as It Turns Out

Internet-of-things devices have been around for a while, and at this point, few can deny their utility. However, in order to function, they rely on technological interconnectedness – which is more than a boon –... Read more

June 23, 2020
Unsecured Databases Are Attacked 18 Times a Day screenshot

Unsecured Databases Are Attacked 18 Times a Day

As many of you know, nowadays, the majority of data leaks happen not because hackers break through the security of organizations, but because the organizations themselves put user information in misconfigured... Read more

June 11, 2020
Ring Users Are Forced to Add 2FA Post the Scandalous Data Breach - How to Add the Feature screenshot

Ring Users Are Forced to Add 2FA Post the Scandalous Data Breach - How to Add the Feature

If you like knowing who is at your door before opening it, you might be using the Amazon Ring doorbell. You might even consider it to be a part of your smart home security as the device is perfect for monitoring those... Read more

May 19, 2020
What Is an RDP Attack and How to Protect Yourself Against It? screenshot

What Is an RDP Attack and How to Protect Yourself Against It?

To say that the COVID-19 crisis caught us off guard would be the understatement of the decade. Nobody was expecting the outbreak to be this big, and when we did realize just how serious the problem was, a wave of... Read more

May 4, 2020
Loading...