Threats

What Is Scareware and How to Avoid It? screenshot

What Is Scareware and How to Avoid It?

Quite a few of the people commenting on hacking incidents and data breaches often say that the user is the 'weakest link' in the cybersecurity chain, and we are fully aware that some of you may feel offended by this.... Read more

May 22, 2019
Stop Making These 5 Configuration Mistakes screenshot

Stop Making These 5 Configuration Mistakes

Who is responsible for the current state of cybersecurity? At first glance, this looks like a simple question with a straightforward answer, but when you think about it, you'll see that it's a bit more complicated. On... Read more

May 10, 2019
Do Not Fall for Fake Instagram Helper Apps That Can Steal Your Password screenshot

Do Not Fall for Fake Instagram Helper Apps That Can Steal Your Password

Why are social networks so successful? Well, in short, they are thriving because people spend quite a lot of time using them. And people do this because they're interested in what the rest of the world thinks about... Read more

April 16, 2019
Beware of Malware That Is Spread via LinkedIn DMs screenshot

Beware of Malware That Is Spread via LinkedIn DMs

There seems to be not a single platform that hackers and cyber attackers are not ready to exploit. They can expose you to malware via your own email inbox. They can create fictitious websites to expose you to scams.... Read more

April 1, 2019
Why Are People Covering the Cameras on Their Laptops and Phones? screenshot

Why Are People Covering the Cameras on Their Laptops and Phones?

Last year, Lenovo unveiled its 2018 laptop models and proudly announced that they come with a brand new feature – a built-in cover the slides over the webcam and ensures that nobody can spy on you. Peculiarly, they... Read more

February 12, 2019
Got $50? That's Enough to Buy Someone's Online Identity screenshot

Got $50? That's Enough to Buy Someone's Online Identity

Having your online identity compromised can bring you a lot of grief, and in some cases, financial damages. Few people think about this when they're signing up for various online services using weak passwords or when... Read more

January 17, 2019
Security Experts Warn That Ransomware Creators Are Going Phishing screenshot

Security Experts Warn That Ransomware Creators Are Going Phishing

On May 12, 2017, the WannaCry ransomware encrypted the files of over 200 thousand Windows PCs all around the world and caused millions of dollars in damages. Thanks to EternalBlue, a hacking tool allegedly developed... Read more

May 20, 2019
Qbot Continues Stealing Vulnerable Passwords screenshot

Qbot Continues Stealing Vulnerable Passwords

Dozens of malware families appear every day. Many of them are written by less capable hackers and are not that difficult to protect against which means that usually, they fail to make any sort of significant... Read more

May 8, 2019
A Vulnerability in Xiaomi's Guard Provider App Could Expose Devices to Malware screenshot

A Vulnerability in Xiaomi's Guard Provider App Could Expose Devices to Malware

Many people assume that the only thing they need to do to protect their devices is to install some sort of security software. They tend to view anti-malware products as a panacea that can guarantee the safety of their... Read more

April 5, 2019
Ursnif Trojan Was Resurrected and Now It Targets Your Passwords screenshot

Ursnif Trojan Was Resurrected and Now It Targets Your Passwords

Sometimes certain infections do not disappear for decades. Cyber criminals manage to customize their malicious codes and use them to steal information and money over and over again. Today we would like to draw your... Read more

March 1, 2019
A German Teen Builds an App That Can Steal Passwords from Mac Computers screenshot

A German Teen Builds an App That Can Steal Passwords from Mac Computers

Between July and September, Apple sold just under 47 million iPhones and about 10 million iPads. By contrast, Apple sold around 5.3 million Mac computers in the same time frame. Clearly, the world's favorite... Read more

February 8, 2019
Analysts Find Another Malicious App on Google Play Store That Spreads Malware screenshot

Analysts Find Another Malicious App on Google Play Store That Spreads Malware

Where do you get your apps from? Ideally, you get them from a reputable source, such as the Google Play Store. Unfortunately, the name of this online app market continues to flash in the headlines as new malicious and... Read more

January 10, 2019
Top Scams of 2019 and How They Can Put Your Virtual Security at Risk screenshot

Top Scams of 2019 and How They Can Put Your Virtual Security at Risk

We have talked about some of the biggest online scams that tricked multiple people out there before, but it is time we update that information. Although we're not even halfway through 2019 yet, the cybersecurity... Read more

May 13, 2019
How to Tell If a Website Is Safe screenshot

How to Tell If a Website Is Safe

We've come to accept that certain images and symbols mean certain things. A picture of a padlock, for example, is regularly associated with security. It might seem like the most natural thing in the world, but this... Read more

April 30, 2019
How to Protect Your Mobile Data and Privacy from Cyber Threats in 2019 screenshot

How to Protect Your Mobile Data and Privacy from Cyber Threats in 2019

Every single day brings us new advancements in technology and science. And with that technology controls our lives more and more. Tech brings us a lot of benefits in virtually every part of our lives but it has its... Read more

April 5, 2019
How to Keep Data on USB Flash Drives Safe screenshot

How to Keep Data on USB Flash Drives Safe

What are the advantages and disadvantages of using USB drives? It's true that USB drives offer a large number of security advantages over regular or cloud storage methods, however, they are also not without their own... Read more

February 26, 2019
FormBook Uses a Shady File Hosting Service for Its Latest Password-Stealing Campaign screenshot

FormBook Uses a Shady File Hosting Service for Its Latest Password-Stealing Campaign

How would you feel about a file-sharing platform that states in its FAQ something along the lines of 'Using our service for anything illegal is forbidden, but if you do decide to do it, we won't try to stop you'?... Read more

February 1, 2019
Beware of A New Apple Tech Support Scam screenshot

Beware of A New Apple Tech Support Scam

You can always get a good laugh out of scammers who are trying and failing spectacularly to trick cybersecurity specialists. Unfortunately, when you stop and think about how many other, less savvy users fall for the... Read more

January 10, 2019
Loading...