Hackers Have Compromised a DoD Agency in Charge of Secure White House Communications screenshot

Hackers Have Compromised a DoD Agency in Charge of Secure White House Communications

Several years ago, the US Office of Personnel Management (OPM) suffered a data breach that exposed millions of records that belonged to government employees. It was a pretty serious attack, and in its wake, another... Read more

February 25, 2020
How to Fix FTP 530 Login Authentication Error screenshot

How to Fix FTP 530 Login Authentication Error

FTP servers fulfill the protocol where data, files, and folders are exchanged. These servers are primarily used by FTP clients or webmasters, which work with transferring files into the FTP servers. Sometimes the... Read more

February 25, 2020
A Decade's Worth of Private User Data Has Been Exposed by Rallyhood screenshot

A Decade's Worth of Private User Data Has Been Exposed by Rallyhood

When Zack Whittaker from TechCrunch got in touch with Rallyhood to talk about a misconfigured S3 bucket that exposed quite a lot of user data, he was initially told that the leaky database was used for testing... Read more

February 24, 2020
Would Hackers Go After Your Pets? Unfortunately, They Have That Option screenshot

Would Hackers Go After Your Pets? Unfortunately, They Have That Option

If you have a pet, you know what pantry items should be out of reach. You know not to leave them in a car on a sunny day. You know that doors and windows need to be closed to keep them inside. You know when their... Read more

February 24, 2020
How to Log out of Instagram on All Devices screenshot

How to Log out of Instagram on All Devices

Instagram managed to reach the 1 billion monthly active user mark back in 2018, and there's no sign of the social media giant's growth stopping any time soon. More than 500 million active users use the picture-sharing... Read more

February 24, 2020
MEMS Vulnerability Makes It Possible to Hijack Voice Assistants, Including Alexa, Google Home, or Siri screenshot

MEMS Vulnerability Makes It Possible to Hijack Voice Assistants, Including Alexa, Google Home, or Siri

Virtual assistants were created to perform various tasks to make our lives easier. Over the years, they have changed a lot, and, today, we even have voice assistants like Alexa and Siri that can control several smart... Read more

February 24, 2020
These Are the 6 Pieces of Data You Do NOT Want to Be Stolen by Cybercriminals screenshot

These Are the 6 Pieces of Data You Do NOT Want to Be Stolen by Cybercriminals

Nowadays, cybercriminals are pretty much after any kind of data they can get their hands on. That means that they are looking for full names, usernames, pets’ names, lists of friends, colleagues, and family members,... Read more

February 24, 2020
Nedbank Reports a Data Breach That Could Have Affected 1.7 Million Clients screenshot

Nedbank Reports a Data Breach That Could Have Affected 1.7 Million Clients

In early February, IT experts working for Nedbank, one of South Africa's 'big four' commercial banks, learned that some of their customers might have been affected by a data breach. Within a week, they had thoroughly... Read more

February 21, 2020
How Your Passwords Get Hacked screenshot

How Your Passwords Get Hacked

Nowadays, everything on the internet requires you to type in a password. Since most users avail themselves of a variety of different services, it can be tough to keep track of all of the login details for each and... Read more

February 21, 2020
The UK's Information Commissioner's Office Reports a 200% Increase in SIM-Jacking Attacks screenshot

The UK's Information Commissioner's Office Reports a 200% Increase in SIM-Jacking Attacks

Even though researchers have noticed a significant increase in sim-jacking or sim-swapping attacks in the United Kingdom, such attacks still occur very rarely compared to, for example, data breaches. Not to mention, a... Read more

February 21, 2020
Thinking About Setting up a Separate Network for IoT Devices? Here's How to Do It screenshot

Thinking About Setting up a Separate Network for IoT Devices? Here's How to Do It

Even if you are not fully aware of that, you must have been exposed to the Internet of Things in one way or the other. You probably have multiple smart home devices by now, and all of them are connected to the... Read more

February 21, 2020
Here’s Why Printing Boarding Tickets Is a Bad Idea from a Security Standpoint screenshot

Here’s Why Printing Boarding Tickets Is a Bad Idea from a Security Standpoint

There was once a time when we all had no choice but to print our boarding tickets, which is why many users still include this task into their preparations for a flight. Of course, nowadays, many airlines allow showing... Read more

February 21, 2020
1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 158