How to Check if Someone is Using or Stealing Your Wi-Fi screenshot

How to Check if Someone is Using or Stealing Your Wi-Fi

While internet access is relatively inexpensive nowadays, there will always be those people that just want it for free. Others have more nefarious purposes in mind – there are quite a few reasons why undesirables may...

Read more
May 28, 2019
Customers' Information Dating Back to 2003 Exposed in a First American Financial Data Leak screenshot

Customers' Information Dating Back to 2003 Exposed in a First American Financial Data Leak

Who is responsible for finding security vulnerabilities in software applications and websites? Well, there are people who have this task in their job descriptions. They use their enormous expertise to examine millions...

Read more
May 28, 2019
How to Encrypt Your USB Drive on Mac and Windows screenshot

How to Encrypt Your USB Drive on Mac and Windows

Have you ever lost a flash drive? I bet you have. If you're lucky you lost a cheap USB drive containing a bunch of useless or near-useless files. If you're unlucky, however, you'll lose a lot more than that. Maybe...

Read more
May 28, 2019
Canva Users Are Advised to Change Their Passwords After a Data Breach screenshot

Canva Users Are Advised to Change Their Passwords After a Data Breach

Learning that an online service with hundreds of millions of users has found itself on the receiving end of a cyberattack is never a good thing. However, many different factors regarding the nature of the breached...

Read more
May 28, 2019
5 Steps Towards a Secure Gmail Account screenshot

5 Steps Towards a Secure Gmail Account

Gmail first appeared a little over fifteen years ago, and with more than 1.5 billion monthly active users, it's currently the biggest, most widely used free email provider in the world. This isn't such a huge...

Read more
May 28, 2019
How to fix Your Hacked Email Accounts screenshot

How to fix Your Hacked Email Accounts

Nowadays cyber-security is advancing in leaps and bounds, and plenty of companies are waking up to the necessity of taking measures to ensure the safety of online information. Yet, in spite of all that hard work done...

Read more
May 28, 2019
Spotify Forces Users to Change Passwords After Detecting 'Suspicious Activity' screenshot

Spotify Forces Users to Change Passwords After Detecting 'Suspicious Activity'

According to the official filings, Spotify has around 217 million monthly active users, and of them, close to 100 million are Spotify Premium subscribers. All these people trust the streaming platform to give them...

Read more
May 28, 2019
G Suite Users Change Their Passwords Because of a Credential Storage Blunder screenshot

G Suite Users Change Their Passwords Because of a Credential Storage Blunder

Google has made not one, but two password storage mistakes that directly affect some of its users. This type of news is bound to get quite a few people upset, but before everyone starts pulling their hair out, let's...

Read more
May 22, 2019
What Is Scareware and How to Avoid It? screenshot

What Is Scareware and How to Avoid It?

Quite a few of the people commenting on hacking incidents and data breaches often say that the user is the 'weakest link' in the cybersecurity chain, and we are fully aware that some of you may feel offended by this....

Read more
May 22, 2019
How to Permanently Delete Your Old Flickr Account screenshot

How to Permanently Delete Your Old Flickr Account

Flickr is an online photo and video sharing service, which was owned by Yahoo until recently. Now it has been purchased by SmugMug. You can upload and share your images and videos on Flickr as well as post them...

Read more
May 22, 2019
7 Easy Ways to Remember Passwords Without Forgetting Them screenshot

7 Easy Ways to Remember Passwords Without Forgetting Them

As time passes, cyber-crime is only becoming more prevalent – which is why it pays to invest at least a little bit of your time and energy in ensuring that you don’t become the victim of an online attack. There are a...

Read more
May 22, 2019
Why Does Google Need Your Personal Phone Number? screenshot

Why Does Google Need Your Personal Phone Number?

In a recent blog post, Kurt Thomas and Angelika Moscicki from Google's security team spoke about, among other things, account hijacking and how much it costs. It turns out that a hacking group can charge as much as...

Read more
May 21, 2019
Flickr Ditches Yahoo Login System: Here's How to Log in Your Flickr Account Now screenshot

Flickr Ditches Yahoo Login System: Here's How to Log in Your Flickr Account Now

Good news for those of you who use Flickr. The image and video hosting service has finally removed the cumbersome Yahoo login and is no longer tied to Yahoo overall. The image and video sharing service Flickr...

Read more
May 21, 2019
Security Experts Warn That Ransomware Creators Are Going Phishing screenshot

Security Experts Warn That Ransomware Creators Are Going Phishing

On May 12, 2017, the WannaCry ransomware encrypted the files of over 200 thousand Windows PCs all around the world and caused millions of dollars in damages. Thanks to EternalBlue, a hacking tool allegedly developed...

Read more
May 20, 2019
Devious PayPal Scams Target Users' Passwords and Credit Card Information screenshot

Devious PayPal Scams Target Users' Passwords and Credit Card Information

According to Vade Secure, PayPal is the second-most targeted brand by phishers. This shouldn't be very surprising. We're talking about the world's most recognizable online payment platform, and unauthorized access to...

Read more
May 17, 2019
What Is SMS Bombing and How Can It Affect Your Security? screenshot

What Is SMS Bombing and How Can It Affect Your Security?

It would appear that SMS bombing (also known as Text bombing) doesn't seem to have a definition that all experts agree upon. Many of the hits you get on Google will tell you that SMS bombing is the act of using an...

Read more
May 17, 2019
How to Reset Your Forgotten Pandora Password screenshot

How to Reset Your Forgotten Pandora Password

Pandora Internet Radio, also known as Pandora Radio or simply Pandora is an online radio service. It has a strong focus on music streaming. Not only that but Pandora has an automated music recommendation feature which...

Read more
May 17, 2019
Phone Retailer Boost Mobile Announces a Data Breach Two Months After It Happened screenshot

Phone Retailer Boost Mobile Announces a Data Breach Two Months After It Happened

The Boost Mobile brand was brought to the US nearly eighteen years ago. Since then, the phone retailer and telecommunication service provider has invested enormous sums of money into marketing efforts, and it now...

Read more
May 16, 2019
1 2 3 4 5 6 7 8 9 10 11 12 13 14 50