News
WiFi Finder Exposed Over 2 Million Wi-Fi Passwords
You probably know that you should never share passwords. But can this piece of advice be applied to every single situation? No, it can't. Work often requires you to use the same login credentials with some of your... Read more
What Is Instagram's 'Hotlist' Scam and What to Do If You Fall into Its Trap
It's fair to say that Facebook isn't enjoying its best days at the moment. It recently became apparent that thanks to the last year's Cambridge Analytica scandal, Mark Zuckerberg's social media empire could be looking... Read more
Can Your Adblocker Extension Execute Malicious Code? Yes, It Can
Here's a controversial topic for you – ads and the internet. Many of the online services and websites we use every day are available to us completely free of charge. Operating these services is anything but free,... Read more
What Is Instagram's Nasty List and What to Do If You're on It?
If you're told that you've ended up on Instagram's 'Nasty List', you'll likely want to know what the reason for this is. A 'Nasty List' sounds like a list of accounts that have done something wrong, so, especially if... Read more
What Is a Baldr Data Stealer and How to Protect Your Passwords Against It
Baldr is the name of a new family of information-stealing malware. Its authors first introduced it to cybercriminal circles in January, and about a month later, Microsoft's security team reported that they have seen... Read more
Millions of Facebook and Instagram Passwords Were Left in Plain Sight. What Now?
If you are an avid Facebook or Instagram user, you definitely know that signing into your accounts has never been easier. All of your devices can sign you in automatically, when your passwords are saved in your... Read more
Look Out: Your Microsoft Account Could Be Used to Steal Cryptocurrency!
If you're an Outlook user who has some cryptocurrency stored in an online exchange account, now would be a good time to log in to the said exchange account and make sure that everything is where it should be. As you... Read more
Would You Sell Your Private Data Online? Survey Says 39% of You Would!
Let's think of something that can be done both in the virtual and in the real world and see which of the two approaches is more threatening to your security and privacy. If you're going to a brick-and-mortar shop to... Read more
Steps Every Outlook User Must Take in the Wake of a Major Security Breach
Last Friday, Outlook users started receiving breach notification emails from Microsoft which, in addition to telling them that an unknown attacker has accessed some of the information in their inbox, informed them... Read more
There's a Fake Google Wallet App, and It Is Used to Hijack Google Accounts
You could argue that Google is the classic Silicon Valley success story. What started off as a useful search engine is now a commanding part of almost everything we do online. Over the years, Google released apps and... Read more
99 Phishing Sites but Microsoft Did Not Leave One
A phishing website is a wonderful instrument for virtual schemers. Once a phishing website is set up, the attackers can trick gullible visitors into disclosing personal information or interacting with unreliable or... Read more
What Is a Two-Factor Authentication Phishing Attack?
When you leave your home, do you just leave the light on to trick thieves into thinking that someone’s home, or do you lock all doors and windows? When you park your car, do you lock it but leave the window open, or... Read more
Bodybuilding.com Users Are Advised to Change Passwords After a Data Breach
Bodybuilding.com bills itself as more than just an online fitness shop. According to the About Us page, there are over 9 million members of BodySpace – Bodybuilding.com's social network for fitness enthusiasts who... Read more
If You Are Using Fingerprint Authentication on a Nokia Phone, You Might Want to Switch Back to a Password
The theory suggests that competition as fierce as the one we see in the mobile device market will result in products with top-notch quality and great prices. In reality, however, things don't always work out that way.... Read more
It Takes Hackers 60 Seconds to Find and Attack a Vulnerable Server
Movies and, to a certain extent, mainstream media would have us believe that organizing a cyberattack involves a lot of planning, plenty of resources, and a teenage computer geek who's in a bad mood all the time. This... Read more
What Is a Google Security Key and How Does It Work with Your Android 7.0+ Phone?
Google's security people reckon that they know a thing or two about Two-Factor Authentication (2FA) or 2-Step Verification, as they like to call it. They think that the most secure 2FA systems are the ones based on a... Read more
A Mobile Application Exposed Passwords and Enabled Car Theft
As you probably know, the tendency to connect everyday objects to the internet is often referred to as the Internet of Things (IoT) revolution, and although nowadays, we ought to be rather careful when using words... Read more
Two Leaky Databases Left over 540 Million Facebook User Records Publicly Accessible
For a while now, Facebook has been making headlines for all the wrong reasons. Last month, security reporter Brian Krebs revealed that the passwords of hundreds of millions of people had been stored in plaintext in... Read more