News

WiFi Finder Exposed Over 2 Million Wi-Fi Passwords screenshot

WiFi Finder Exposed Over 2 Million Wi-Fi Passwords

You probably know that you should never share passwords. But can this piece of advice be applied to every single situation? No, it can't. Work often requires you to use the same login credentials with some of your... Read more

May 3, 2019
What Is Instagram's 'Hotlist' Scam and What to Do If You Fall into Its Trap screenshot

What Is Instagram's 'Hotlist' Scam and What to Do If You Fall into Its Trap

It's fair to say that Facebook isn't enjoying its best days at the moment. It recently became apparent that thanks to the last year's Cambridge Analytica scandal, Mark Zuckerberg's social media empire could be looking... Read more

April 25, 2019
Can Your Adblocker Extension Execute Malicious Code? Yes, It Can screenshot

Can Your Adblocker Extension Execute Malicious Code? Yes, It Can

Here's a controversial topic for you – ads and the internet. Many of the online services and websites we use every day are available to us completely free of charge. Operating these services is anything but free,... Read more

April 22, 2019
What Is Instagram's Nasty List and What to Do If You're on It? screenshot

What Is Instagram's Nasty List and What to Do If You're on It?

If you're told that you've ended up on Instagram's 'Nasty List', you'll likely want to know what the reason for this is. A 'Nasty List' sounds like a list of accounts that have done something wrong, so, especially if... Read more

April 16, 2019
What Is a Baldr Data Stealer and How to Protect Your Passwords Against It screenshot

What Is a Baldr Data Stealer and How to Protect Your Passwords Against It

Baldr is the name of a new family of information-stealing malware. Its authors first introduced it to cybercriminal circles in January, and about a month later, Microsoft's security team reported that they have seen... Read more

April 12, 2019
Millions of Facebook and Instagram Passwords Were Left in Plain Sight. What Now? screenshot

Millions of Facebook and Instagram Passwords Were Left in Plain Sight. What Now?

If you are an avid Facebook or Instagram user, you definitely know that signing into your accounts has never been easier. All of your devices can sign you in automatically, when your passwords are saved in your... Read more

April 11, 2019
Look Out: Your Microsoft Account Could Be Used to Steal Cryptocurrency! screenshot

Look Out: Your Microsoft Account Could Be Used to Steal Cryptocurrency!

If you're an Outlook user who has some cryptocurrency stored in an online exchange account, now would be a good time to log in to the said exchange account and make sure that everything is where it should be. As you... Read more

May 2, 2019
Would You Sell Your Private Data Online? Survey Says 39% of You Would! screenshot

Would You Sell Your Private Data Online? Survey Says 39% of You Would!

Let's think of something that can be done both in the virtual and in the real world and see which of the two approaches is more threatening to your security and privacy. If you're going to a brick-and-mortar shop to... Read more

April 24, 2019
Steps Every Outlook User Must Take in the Wake of a Major Security Breach screenshot

Steps Every Outlook User Must Take in the Wake of a Major Security Breach

Last Friday, Outlook users started receiving breach notification emails from Microsoft which, in addition to telling them that an unknown attacker has accessed some of the information in their inbox, informed them... Read more

April 17, 2019
There's a Fake Google Wallet App, and It Is Used to Hijack Google Accounts screenshot

There's a Fake Google Wallet App, and It Is Used to Hijack Google Accounts

You could argue that Google is the classic Silicon Valley success story. What started off as a useful search engine is now a commanding part of almost everything we do online. Over the years, Google released apps and... Read more

April 15, 2019
99 Phishing Sites but Microsoft Did Not Leave One screenshot

99 Phishing Sites but Microsoft Did Not Leave One

A phishing website is a wonderful instrument for virtual schemers. Once a phishing website is set up, the attackers can trick gullible visitors into disclosing personal information or interacting with unreliable or... Read more

April 12, 2019
What Is a Two-Factor Authentication Phishing Attack? screenshot

What Is a Two-Factor Authentication Phishing Attack?

When you leave your home, do you just leave the light on to trick thieves into thinking that someone’s home, or do you lock all doors and windows? When you park your car, do you lock it but leave the window open, or... Read more

April 11, 2019
Bodybuilding.com Users Are Advised to Change Passwords After a Data Breach screenshot

Bodybuilding.com Users Are Advised to Change Passwords After a Data Breach

Bodybuilding.com bills itself as more than just an online fitness shop. According to the About Us page, there are over 9 million members of BodySpace – Bodybuilding.com's social network for fitness enthusiasts who... Read more

May 2, 2019
If You Are Using Fingerprint Authentication on a Nokia Phone, You Might Want to Switch Back to a Password screenshot

If You Are Using Fingerprint Authentication on a Nokia Phone, You Might Want to Switch Back to a Password

The theory suggests that competition as fierce as the one we see in the mobile device market will result in products with top-notch quality and great prices. In reality, however, things don't always work out that way.... Read more

April 24, 2019
It Takes Hackers 60 Seconds to Find and Attack a Vulnerable Server screenshot

It Takes Hackers 60 Seconds to Find and Attack a Vulnerable Server

Movies and, to a certain extent, mainstream media would have us believe that organizing a cyberattack involves a lot of planning, plenty of resources, and a teenage computer geek who's in a bad mood all the time. This... Read more

April 17, 2019
What Is a Google Security Key and How Does It Work with Your Android 7.0+ Phone? screenshot

What Is a Google Security Key and How Does It Work with Your Android 7.0+ Phone?

Google's security people reckon that they know a thing or two about Two-Factor Authentication (2FA) or 2-Step Verification, as they like to call it. They think that the most secure 2FA systems are the ones based on a... Read more

April 15, 2019
A Mobile Application Exposed Passwords and Enabled Car Theft screenshot

A Mobile Application Exposed Passwords and Enabled Car Theft

As you probably know, the tendency to connect everyday objects to the internet is often referred to as the Internet of Things (IoT) revolution, and although nowadays, we ought to be rather careful when using words... Read more

April 11, 2019
Two Leaky Databases Left over 540 Million Facebook User Records Publicly Accessible screenshot

Two Leaky Databases Left over 540 Million Facebook User Records Publicly Accessible

For a while now, Facebook has been making headlines for all the wrong reasons. Last month, security reporter Brian Krebs revealed that the passwords of hundreds of millions of people had been stored in plaintext in... Read more

April 5, 2019
Loading...