A New Study Finds That 54% of Participants Did Not Know How to Check for Password Breaches screenshot

A New Study Finds That 54% of Participants Did Not Know How to Check for Password Breaches

An informative new study that surveyed 15 thousand consumers across a whopping 23 countries recently found that a bit more than half of internet users have no clue how to check if their passwords have been hacked,... Read more

June 17, 2020
What Is Mass Logger and Why Does It Have Cybersecurity Researchers Worried? screenshot

What Is Mass Logger and Why Does It Have Cybersecurity Researchers Worried?

Hacking forums are busy places. Malware authors fight to make fat wads of cash by selling their products to wannabe cybercriminals, and it must be said that there is no shortage of buyers. The competition is stiff,... Read more

June 17, 2020
How to Fix Error 0x800708c5 - Windows Can't Complete the Password Change screenshot

How to Fix Error 0x800708c5 - Windows Can't Complete the Password Change

Some users have reported encountering the 0x800708c5 while requesting a password reset. This error message is displayed when the password does not meet the password policy requirements on the domain side. Sometimes an... Read more

June 16, 2020
A Data Breach at a Live Event Equipment Manufacturer Reveals Employees' Personal and Financial Data screenshot

A Data Breach at a Live Event Equipment Manufacturer Reveals Employees' Personal and Financial Data

Last week, TAIT Towers Manufacturing LLC, a manufacturer of equipment for live events and concerts that has worked with the likes of Lady Gaga and Taylor Swift, issued one of those statements where it has to explain... Read more

June 16, 2020
More Than 20 Million Files Have Been Leaked by 9 Different Dating Apps screenshot

More Than 20 Million Files Have Been Leaked by 9 Different Dating Apps

To prove how dangerous unsecured databases could be, a group of researchers recently filled an Elasticsearch installation with dummy data, deliberately misconfigured it, and waited to see how long it would take for... Read more

June 16, 2020
How to Create a Gmail/Google Account for Your Child screenshot

How to Create a Gmail/Google Account for Your Child

Gmail is an excellent free email service from Google. You can access Gmail on a desktop, tablet, and smartphones and even with third-party programs that sync email content. While we think of our emails as relatively... Read more

June 15, 2020
Human Error Becomes GDPR Data Breach Trend in 2020 screenshot

Human Error Becomes GDPR Data Breach Trend in 2020

Human error has been widely reported to have caused 90% of cyber data breaches in 2019. Information provided by the UK Information Commissioner’s Office (ICO) has lead security experts to believe that nine out of ten... Read more

June 15, 2020
How to Protect Yourself From Fortnite Scams screenshot

How to Protect Yourself From Fortnite Scams

There's no denying that Fortnite is the most popular video game on the planet right now. With that kind of fame and such a massive player base, Fornite scams become potentially a very lucrative endeavor. A security... Read more

June 15, 2020
Keepnet Labs Confirms That 5 Billion Email Addresses and Passwords Collated From Previous Data Breaches Were Exposed screenshot

Keepnet Labs Confirms That 5 Billion Email Addresses and Passwords Collated From Previous Data Breaches Were Exposed

A database with five billion records full of usernames and passwords was exposed to the internet and was not protected by any form of authentication. Predictably, the incident grabbed more than a few headlines,... Read more

June 15, 2020
Patients' Social Security Numbers Have Been Compromised in a MU Health Care Data Breach screenshot

Patients' Social Security Numbers Have Been Compromised in a MU Health Care Data Breach

People tend to forget that the most important task after discovering a data breach is protecting the user's privacy. Instead, they often focus on finding out who or what is to blame for the incident. Let's take this... Read more

June 15, 2020
Coronavirus-Related Malware Lurking in Resumes and Medical Leave Files screenshot

Coronavirus-Related Malware Lurking in Resumes and Medical Leave Files

Cyberattackers turn to every tool in their box of tricks to dupe you into allowing malware into your system. After corrupting a variety of files, maps, links, and whatnot connected to COVID-19, now they've turned to... Read more

June 12, 2020
Here's How Bitcoin Scammers Were Able to Hijack 3 YouTube Channels to Impersonate SpaceX screenshot

Here's How Bitcoin Scammers Were Able to Hijack 3 YouTube Channels to Impersonate SpaceX

You'd think that online scams would have a relatively short lifespan nowadays. Information travels fast, and people quickly learn of the threats that lurk around every corner of the internet. That's the theory, but in... Read more

June 12, 2020
1 2 3 4 5 6 7 8 9 10 11 12 13 14 139