Watch Out for Phishing Emails Exploiting Amazon Prime Day Deals screenshot

Watch Out for Phishing Emails Exploiting Amazon Prime Day Deals

Despite its name, Amazon Prime Day is a two-day discount campaign conducted by online retail supergiant Amazon that takes place on the 13th and 14th of October. As the world gears up for reckless shopping, security... Read more

October 9, 2020
65% of Form-Based Attacks Involve docs.google.com, drive.google.com, storage.cloud.google.com, and storage.googleapis.com screenshot

65% of Form-Based Attacks Involve docs.google.com, drive.google.com, storage.cloud.google.com, and storage.googleapis.com

Are you familiar with the term spear phishing attack? This term defines the type of a cyberattack that, in most cases, exploits email and other e-communication platforms to trick individuals into revealing sensitive... Read more

October 9, 2020
How to Add Multi-Factor Authentication to Secure Your Tesla Account screenshot

How to Add Multi-Factor Authentication to Secure Your Tesla Account

One thing that security researchers have been trying to drive home for years now is the necessity of multi-factor authentication and its great utility as an added security feature. If you are a Tesla owner, you also... Read more

October 9, 2020
How to Change Your Wattpad Password screenshot

How to Change Your Wattpad Password

Wattpad is a platform for writing and sharing stories with your audience across the globe, available both on desktop and mobile devices. It was also the target of a massive data breach that took place in the summer of... Read more

October 8, 2020
2 Million Users of the E-Learning Platform Edureka Potentially Affected in Data Breach screenshot

2 Million Users of the E-Learning Platform Edureka Potentially Affected in Data Breach

A new data breach has been reported by security experts with SafetyDetectives. The breach in question affected the Edureka e-learning platform and potentially affected millions of users. Edureka is an Indian... Read more

October 8, 2020
What Is Data Personalization and What Do You Need to Know About It? screenshot

What Is Data Personalization and What Do You Need to Know About It?

The average person uses a large number of interactive media platforms and social media networks on a daily basis. Whether you chill with a Netflix series in the evening, watch vintage car restoration videos on... Read more

October 7, 2020
Phishing Scheme Uses CAPTCHA on Fake Login Pages to Make Them Look Legitimate screenshot

Phishing Scheme Uses CAPTCHA on Fake Login Pages to Make Them Look Legitimate

Researchers with Menlo Security found a new phishing scheme that was using fake Captcha checks. The bad actors behind the credentials theft scam were primarily targeting businesses and organizations in the hospitality... Read more

October 7, 2020
Grindr Vulnerability Allowed Hackers to Reset Accounts' Passwords and Take Over Accounts screenshot

Grindr Vulnerability Allowed Hackers to Reset Accounts' Passwords and Take Over Accounts

A significant Grindr vulnerability was discovered in September 2020. The security issue allowed bad actors to take over a user's Grind account if they simply knew the user's e-mail address. The adult-oriented social... Read more

October 6, 2020
Yes, Even Smart Plugs Can Help Steal Passwords screenshot

Yes, Even Smart Plugs Can Help Steal Passwords

Technology can be amazing. It's easy to get excited about the idea of having conveniences that were unthinkable a couple of decades ago, including all the fancy gadgetry of a smart home. However, every single device... Read more

October 5, 2020
Account Takeover Fraud Nearly Triples Over Past 12 Months screenshot

Account Takeover Fraud Nearly Triples Over Past 12 Months

Bad actors and cybercriminals are always looking for ways to expand their illegal activities. The field of account takeover fraud is no exception. Statistics published by cybersecurity company Sift show that account... Read more

October 5, 2020
Cybersecurity Experts Have Faced a

Cybersecurity Experts Have Faced a "Game-Changing" Phishing Scheme

A recent cyberattack was dubbed "game-changing" - wording you obviously don't see every day. What makes that particular phishing attack that impressive, though? The attack was detailed and analyzed by security... Read more

October 2, 2020
If You Are Using a Budget Tracking App, Have You Made Sure That It Is Secure? screenshot

If You Are Using a Budget Tracking App, Have You Made Sure That It Is Secure?

Budget management software is nothing new. Budgeting applications have existed since the days of the Amiga home computer. However, modern mobile phones and the increasingly more user-friendly interface of current... Read more

October 2, 2020
1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 165