Threats
What Is Scareware and How to Avoid It?
Quite a few of the people commenting on hacking incidents and data breaches often say that the user is the 'weakest link' in the cybersecurity chain, and we are fully aware that some of you may feel offended by this.... Read more
Stop Making These 5 Configuration Mistakes
Who is responsible for the current state of cybersecurity? At first glance, this looks like a simple question with a straightforward answer, but when you think about it, you'll see that it's a bit more complicated. On... Read more
Do Not Fall for Fake Instagram Helper Apps That Can Steal Your Password
Why are social networks so successful? Well, in short, they are thriving because people spend quite a lot of time using them. And people do this because they're interested in what the rest of the world thinks about... Read more
Beware of Malware That Is Spread via LinkedIn DMs
There seems to be not a single platform that hackers and cyber attackers are not ready to exploit. They can expose you to malware via your own email inbox. They can create fictitious websites to expose you to scams.... Read more
Why Are People Covering the Cameras on Their Laptops and Phones?
Last year, Lenovo unveiled its 2018 laptop models and proudly announced that they come with a brand new feature – a built-in cover the slides over the webcam and ensures that nobody can spy on you. Peculiarly, they... Read more
Got $50? That's Enough to Buy Someone's Online Identity
Having your online identity compromised can bring you a lot of grief, and in some cases, financial damages. Few people think about this when they're signing up for various online services using weak passwords or when... Read more
Security Experts Warn That Ransomware Creators Are Going Phishing
On May 12, 2017, the WannaCry ransomware encrypted the files of over 200 thousand Windows PCs all around the world and caused millions of dollars in damages. Thanks to EternalBlue, a hacking tool allegedly developed... Read more
Qbot Continues Stealing Vulnerable Passwords
Dozens of malware families appear every day. Many of them are written by less capable hackers and are not that difficult to protect against which means that usually, they fail to make any sort of significant... Read more
A Vulnerability in Xiaomi's Guard Provider App Could Expose Devices to Malware
Many people assume that the only thing they need to do to protect their devices is to install some sort of security software. They tend to view anti-malware products as a panacea that can guarantee the safety of their... Read more
Ursnif Trojan Was Resurrected and Now It Targets Your Passwords
Sometimes certain infections do not disappear for decades. Cyber criminals manage to customize their malicious codes and use them to steal information and money over and over again. Today we would like to draw your... Read more
A German Teen Builds an App That Can Steal Passwords from Mac Computers
Between July and September, Apple sold just under 47 million iPhones and about 10 million iPads. By contrast, Apple sold around 5.3 million Mac computers in the same time frame. Clearly, the world's favorite... Read more
Analysts Find Another Malicious App on Google Play Store That Spreads Malware
Where do you get your apps from? Ideally, you get them from a reputable source, such as the Google Play Store. Unfortunately, the name of this online app market continues to flash in the headlines as new malicious and... Read more
Top Scams of 2019 and How They Can Put Your Virtual Security at Risk
We have talked about some of the biggest online scams that tricked multiple people out there before, but it is time we update that information. Although we're not even halfway through 2019 yet, the cybersecurity... Read more
How to Tell If a Website Is Safe
We've come to accept that certain images and symbols mean certain things. A picture of a padlock, for example, is regularly associated with security. It might seem like the most natural thing in the world, but this... Read more
How to Protect Your Mobile Data and Privacy from Cyber Threats in 2019
Every single day brings us new advancements in technology and science. And with that technology controls our lives more and more. Tech brings us a lot of benefits in virtually every part of our lives but it has its... Read more
How to Keep Data on USB Flash Drives Safe
What are the advantages and disadvantages of using USB drives? It's true that USB drives offer a large number of security advantages over regular or cloud storage methods, however, they are also not without their own... Read more
FormBook Uses a Shady File Hosting Service for Its Latest Password-Stealing Campaign
How would you feel about a file-sharing platform that states in its FAQ something along the lines of 'Using our service for anything illegal is forbidden, but if you do decide to do it, we won't try to stop you'?... Read more
Beware of A New Apple Tech Support Scam
You can always get a good laugh out of scammers who are trying and failing spectacularly to trick cybersecurity specialists. Unfortunately, when you stop and think about how many other, less savvy users fall for the... Read more