Computer Security

Google Blocks Over 18 Million Coronavirus Phishing Emails on Gmail Each Day screenshot

Google Blocks Over 18 Million Coronavirus Phishing Emails on Gmail Each Day

Coronavirus has affected all of us. Living through this pandemic has led to an array of adjustments and a new outlook on social responsibility. Cybercrooks, on the other hand, look at Coronavirus as nothing more than... Read more

April 30, 2020
Watch out for Fake PayPal SMS Messages That Are Used by Schemers! screenshot

Watch out for Fake PayPal SMS Messages That Are Used by Schemers!

It seems that only yesterday we talked about the “New Login From Unknown Device” scam designed to trick unsuspecting PayPal users into giving away their sensitive information. This scam centered around emails that... Read more

April 20, 2020
How Does the New York SHIELD Act Affect the Privacy of Our Private Data? screenshot

How Does the New York SHIELD Act Affect the Privacy of Our Private Data?

Somewhat understandably, the current coronavirus pandemic means that not that many people are thinking about data security at the moment. Nevertheless, the virus will be defeated (hopefully) soon, and we'll need to... Read more

April 7, 2020
Breach Candy Hospital Leaves 121 Million Patients' Records Exposed screenshot

Breach Candy Hospital Leaves 121 Million Patients' Records Exposed

We expect companies that handle our most personal information to take every possible safety precaution to protect us from cybercriminals. However, not all organizations take cyber security seriously even if they are... Read more

March 30, 2020
Coronavirus Scam Uses a Fake COVID-19 Map Pushing an App That Lets Cybercrooks Spy on You Through Your Phone screenshot

Coronavirus Scam Uses a Fake COVID-19 Map Pushing an App That Lets Cybercrooks Spy on You Through Your Phone

We are currently living through a pandemic. Coronavirus is spreading rapidly and has become a global issue. People are scared, and the news is only adding to that fear. Every time you turn on a TV, open a site, or any... Read more

March 25, 2020
What Is Juice Jacking? Is It Safe to Use Public USB Ports? screenshot

What Is Juice Jacking? Is It Safe to Use Public USB Ports?

You're in a public place, you need to use your smartphone, but you've forgotten to charge it up before you left home. You don't have a charger, and you've never really grown used to carrying bulky power banks with... Read more

March 10, 2020
Beware of the Clever

Beware of the Clever "New Device Signed in to Your Stripe" Phishing Scam

As a whole, cybercriminals don’t tend to discriminate in their choice of targets. Between those who specialize in corporate extortion or prefer brutalizing small companies, government institutions, or performing DDOS... Read more

April 27, 2020
Data of More Than 600,000 Email.It Users Has Been Hacked and Sold on the Dark Web screenshot

Data of More Than 600,000 Email.It Users Has Been Hacked and Sold on the Dark Web

Data breaches have been a constant plague on the IT industry for a long time now. It seems that there's not a week that passes without news of another critical one being reported by a major company, such as Equifax or... Read more

April 16, 2020
Hijacked Routers Used to Spread Coronavirus Malware-Ridden Apps screenshot

Hijacked Routers Used to Spread Coronavirus Malware-Ridden Apps

We are living through a pandemic, and in this time of unrest, panic surrounding Coronavirus has yet to subside. People feel uneasy and scared of what's to come. In these frightening times, cybercriminals thrive.... Read more

April 3, 2020
'I Got Phished' Promises to Notify the Victims of Phishing Scams screenshot

'I Got Phished' Promises to Notify the Victims of Phishing Scams

If most of your work tasks are performed online, you probably encounter phishing emails from time to time. Everyone knows (at least in theory) that they need to avoid phishing, but sometimes it is hard to tell... Read more

March 30, 2020
Rainbow Table Password Attack - What Is It and How Do You Protect Yourself From It screenshot

Rainbow Table Password Attack - What Is It and How Do You Protect Yourself From It

A rainbow table is just one of the many potent tools in the arsenal of the cybercriminals of today. While a rainbow table password attack has its limitations, it does give hackers the opportunity to effectively steal... Read more

March 24, 2020
$405 Million Has Been Stolen From Military Veterans Using Scams Since 2012 screenshot

$405 Million Has Been Stolen From Military Veterans Using Scams Since 2012

When it comes to fraudsters, they feel no shame as they prey on the most vulnerable people like military veterans who, for example, might require money or might be unable to say no to other soldiers in need. According... Read more

March 10, 2020
What Is Disk Image and How You Can Use It screenshot

What Is Disk Image and How You Can Use It

Optical disks are not really relevant these days – indeed, many people consider them something of a relic of a bygone age. It’s fair to say that optical disk drives were a significant evolutionary step in a... Read more

April 21, 2020
Which Two-Factor Authentication Option Is the Best? screenshot

Which Two-Factor Authentication Option Is the Best?

On the face of it, two-factor authentication (2FA) is a ruthlessly simple and incredibly effective security feature. In essence, by implementing two-factor authentication, you ensure that an attacker can't take over a... Read more

April 16, 2020
Downloading Pirated Software Is Not Only Illegal but Also Dangerous screenshot

Downloading Pirated Software Is Not Only Illegal but Also Dangerous

Where do you go when you want to install a new program or a new game? Hopefully, you are relying on legitimate download websites and you are doing your research before committing to anything. Note that if you end up... Read more

April 1, 2020
1 Billion WI-Fi Connected Devices Are Vulnerable Due to a Security Vulnerability screenshot

1 Billion WI-Fi Connected Devices Are Vulnerable Due to a Security Vulnerability

IoT is the future, or so we're being told all the time - with technology not so much marching, but rather frog leaping into orbit, smart homes and interconnected appliances that you can command at will from your phone... Read more

March 30, 2020
Scam Alert - Watch out for Fake Walmart Password Reset Email screenshot

Scam Alert - Watch out for Fake Walmart Password Reset Email

Nowadays, technology does not so much march forward as skyrockets into new and unexpected directions at a staggering speed. Using the Internet is practically a necessity for business and personal matters.... Read more

March 13, 2020
Have You Reached Full Gmail Potential? A

Have You Reached Full Gmail Potential? A "Good Enough" Password Won't Do the Trick

If you don’t have a Gmail account, you must be very independent and self-sufficient. Or perhaps you’ve been living in a taiga all this time. Either way, it is a lot more common to have several Gmail accounts these... Read more

March 9, 2020
Loading...