Employees and CIOs Can't Agree on Who Is to Blame for the Constant Torrent of Insider Data Breaches screenshot

Employees and CIOs Can't Agree on Who Is to Blame for the Constant Torrent of Insider Data Breaches

Far too often, when a large organization is hit by a data breach, it's quick to announce that an investigation is ongoing and that its security specialists, along with outside experts and law enforcement agents will... Read more

September 27, 2019
Is Your Photocopier Spying on Your Business? That Depends on the Password screenshot

Is Your Photocopier Spying on Your Business? That Depends on the Password

Lots of businesses are aware of cyber-security threats, and some of them take various precautions to secure computers of their employees. However, while it is vital to guard computers, it is also essential to secure... Read more

September 27, 2019
Here's All You Need to Know About Adaptive Multi-Factor Authentication screenshot

Here's All You Need to Know About Adaptive Multi-Factor Authentication

Everyone wants to protect their network and their data from a malicious breach. One of the best ways to protect sensitive information is to lock it behind a password. Unfortunately, passwords can be easily cracked or... Read more

September 26, 2019
Your Employees Know That Their Passwords Are Weak, but They Will Not Change Them screenshot

Your Employees Know That Their Passwords Are Weak, but They Will Not Change Them

The regular user's role tends to be overlooked when mainstream media discusses cybercrime, and to some extent, this is perfectly understandable. After all, selling a story about extremely sophisticated state-sponsored... Read more

September 26, 2019
How to Stop Google Calender Spam screenshot

How to Stop Google Calender Spam

Google Calendar users have been at risk of falling prey to a nasty kind of spam for some time now. It seems to have gained traction recently. This is how it happens: an email with an invitation to an event is sent by... Read more

September 26, 2019
If Your iPhone Was Stolen, Do Not Fall for Fake Messages Claiming That the Device Was Found screenshot

If Your iPhone Was Stolen, Do Not Fall for Fake Messages Claiming That the Device Was Found

Are you attached to your iPhone? If you are, losing it or getting it stolen might feel like the end of the world. We store our lives on our smartphones, and so it is only natural if we wish to keep them safe.... Read more

September 26, 2019
CafePress Finally Fesses up to the Massive Data Breach screenshot

CafePress Finally Fesses up to the Massive Data Breach

Many people now know that popular t-shirt and merchandise retailer CafePress suffered a major data breach back in early 2019. In July, the followers of a Twitter account going by the name We Leak Info learned about... Read more

September 25, 2019
Do Not Interact with the Fake Instagram 'Copyright Objection Form' Message screenshot

Do Not Interact with the Fake Instagram 'Copyright Objection Form' Message

Phishers seem to be on a roll at the moment, and they appear to be especially interested in social media accounts. We already told you about the campaign that hit a number of popular YouTube content creators, locking... Read more

September 25, 2019
How to Fix Mac Mail Repeatedly Asking for Password Issue screenshot

How to Fix Mac Mail Repeatedly Asking for Password Issue

Are you having trouble with Mac Mail and accessing your e-mail? A common problem you could run into is one where the Mail app repeatedly prompts you for your password when you're opening your inbox or attempting to... Read more

September 25, 2019
YouTube Creators Hit by a Major Account Takeover Attack screenshot

YouTube Creators Hit by a Major Account Takeover Attack

Individual users fall victims to phishing and lose access to their online accounts on a daily basis, and this sort of thing rarely makes the news. When an attack is aimed at some of the most influential names in an... Read more

September 24, 2019
Hackers That Allegedly Breached the EtherDelta Cryptocurrency Exchange Have Been Charged screenshot

Hackers That Allegedly Breached the EtherDelta Cryptocurrency Exchange Have Been Charged

Data breaches often result in the leaking of phone numbers, but people, in general, don't seem to be too bothered about this particular piece of personal information. They reckon that criminals don't have much use for... Read more

September 24, 2019
Facebook Messenger Scam: How to Spot It and Not Become a Victim screenshot

Facebook Messenger Scam: How to Spot It and Not Become a Victim

A new internet scam is running wild on Facebook Messenger. Messages like: "If you pay $500 you get 30,000. If you pay 950, which is what I did, you get 50,000," have become increasingly common. Linda Lee received one... Read more

September 24, 2019
Let InnfiRAT In, and Your Passwords and Crypto Wallet Data May Be Stolen screenshot

Let InnfiRAT In, and Your Passwords and Crypto Wallet Data May Be Stolen

You might think that stealing people's money over the internet isn't that hard. You just compromise some credit card details or some online banking credentials, and you're ready to go. The thing is, it's a bit more... Read more

September 20, 2019
Yahoo Is Finally Paying for the Massive 2012-2016 Data Breach, and You Can Get a Piece of It Too screenshot

Yahoo Is Finally Paying for the Massive 2012-2016 Data Breach, and You Can Get a Piece of It Too

Far too often, when an online service provider loses your data, you have no hope of receiving any sort of compensation for the damage that's been done to you. In most cases, this sort of thing happens to small... Read more

September 20, 2019
Schemers Send Fake 'Temporary Password' and 'One-Time Password' IRS Emails screenshot

Schemers Send Fake 'Temporary Password' and 'One-Time Password' IRS Emails

Do you still submit your tax return forms on paper? If you are up with the times, it is most likely that you have already shifted to doing that online. If that is the case, you must have created an IRS (Internal... Read more

September 20, 2019
The Hackers Behind the Gootkit Malware Forgot to Secure Their Database with a Password screenshot

The Hackers Behind the Gootkit Malware Forgot to Secure Their Database with a Password

Some people have problems getting their heads around how much damage a cybercrime operation can do. ZDNet's Catalin Cimpanu and SecurityDiscovery.com's Bob Diachenko spent some time looking closely into an... Read more

September 19, 2019
How to Тurn on Two-factor Authentication for Firefox Browser screenshot

How to Тurn on Two-factor Authentication for Firefox Browser

As cyber-security threats become more and more prevalent, the option for users to use two-factor authentication is becoming more and more necessary. Firefox’s login system allows for syncing bookmarks, passwords, and... Read more

September 19, 2019
How to Optimize Your Internet Speed screenshot

How to Optimize Your Internet Speed

Have you noticed that hotspots seem to be faster than your home Wi-Fi? That's not how it's supposed to work. There are a bunch of reasons why your internet could be slowed down, whether it's wired, wireless, or... Read more

September 19, 2019
1 2 3 4 5 6 7 8 9 10 11 12 61