Computer Security
With Pinterest's Growing Popularity, Hackers' Interest Grows as Well
Even if you do not use Pinterest on a daily basis, or hardly at all, you might have an account on this image-sharing, social-networking platform. Founded in 2009 in San Francisco, USA, it already has 367 million... Read more
'Sign in With Apple' Now Available on More Platforms: How to Use the Feature Safely
If you use Apple products and you are not completely satisfied with Sign in with Google or Sign in with Facebook, you might be happy to hear that you can now Sign in with Apple. You might not be able to use this... Read more
Hackers Have Found Easy Targets in Healthcare Organizations as 75% of Them Worldwide Have Been Affected
It can be hard to grasp the scale of cyber infections if you do not get exposed to them directly. However, the continuous trend allows us to assume that the number of data breaches will continue to grow, and certain... Read more
Cybercriminals Exploit Contact-Tracing Efforts for Profit
We're living through a pandemic that shows no sign of slowing down. COVID-19 has gripped the world. In an attempt to slow the spread of Coronavirus, many countries have introduced contact-tracing efforts. Once you... Read more
Cyberstalking Is a Growing Issue, but There Are Steps You Can Take to Protect Yourself
Cyberstalking is a serious crime that is punishable by law, but sometimes, proving that someone is stalking can be very difficult. In fact, some victims might not even realize that someone is stalking them for a long... Read more
Hackers Are Exploiting Both Facebook and PayPal to Create a Superscam
Imagine this… A real-life friend contacts you via Facebook’s Messenger to ask you for a favor. They are having issues linking their PayPal account to their payment card, and now they cannot transfer the funds to their... Read more
Three Threats You Might Face When Working Remotely
Working remotely sounds like a master plan: you don’t need to roll out of bed to scramble to your commute, and you get to spend your time in your home environment. However, if you’ve been forced into working from home... Read more
What Is a Whaling Attack? How It Works and How to Prevent It
As we learn how to defend ourselves against cyberattacks, cybercriminals come up with new tactics and malicious applications. At some point, they came up with new types of phishing attacks like spear-phishing that can... Read more
Beware of 'Three Mobile' Phishing Scams That Extract Credit Card Details and Passwords
Hutchison 3G UK Ltd., better known as Three UK, is a British telecommunications company that has been in business since 2003. In 17 years, the company has earned the trust of 8.8 million active customers, and it is in... Read more
A New Study Finds That 54% of Participants Did Not Know How to Check for Password Breaches
An informative new study that surveyed 15 thousand consumers across a whopping 23 countries recently found that a bit more than half of internet users have no clue how to check if their passwords have been hacked,... Read more
Cybersecurity Experts Discover Over 9 Billion Compromised Login Credentials From 640 Unique Data Breaches
We all know that we can do better with how we manage passwords, handle data breaches, or deal with account hijacking after hackers steal login credentials. Unfortunately, although we have the knowledge, we do not... Read more
Usenext and Usenet.NL Disclose Data Breaches but Cannot Decide Who's to Blame
On April 29, 2020, two major Usenet service providers almost simultaneously disclosed security breaches to their systems. Interestingly enough, the messages that UseNeXT and Usenet.nl put out were nearly identical,... Read more
Coronavirus Offers an Opportunity for Schemers to Perform Credit Card Fraud, Experts Say
It doesn’t matter whether you’re still cooped up at home or if you’re already frolicking back and forth, your usual routine back to normal. You must’ve felt the effects of COVID-19, and we’re going to have to live... Read more
Your Virtual Security Could Depend on the Version of the Web Browser You Use
Do you ever stop to think about what web browser you use and whether it is safe? Most likely, you do not put much thought into that. After all, when you open the browser, all you need is that it shows bookmarked... Read more
100,000 Hichip Security Cameras in UK Are Not So Secure, as It Turns Out
Internet-of-things devices have been around for a while, and at this point, few can deny their utility. However, in order to function, they rely on technological interconnectedness – which is more than a boon –... Read more
Unsecured Databases Are Attacked 18 Times a Day
As many of you know, nowadays, the majority of data leaks happen not because hackers break through the security of organizations, but because the organizations themselves put user information in misconfigured... Read more
Ring Users Are Forced to Add 2FA Post the Scandalous Data Breach - How to Add the Feature
If you like knowing who is at your door before opening it, you might be using the Amazon Ring doorbell. You might even consider it to be a part of your smart home security as the device is perfect for monitoring those... Read more
What Is an RDP Attack and How to Protect Yourself Against It?
To say that the COVID-19 crisis caught us off guard would be the understatement of the decade. Nobody was expecting the outbreak to be this big, and when we did realize just how serious the problem was, a wave of... Read more