What Hackers Do After Gaining Access to a Website screenshot

What Hackers Do After Gaining Access to a Website

What are Hackers' objectives? Hackers usually infect websites with malware. Malware can execute many complex and malicious actions on a website, such as malvertising, illegal downloads, ransomware, and more. Online... Read more

September 4, 2019
It Was Confirmed: XKCD Users' Passwords Were Breached During a Data Breach screenshot

It Was Confirmed: XKCD Users' Passwords Were Breached During a Data Breach

Those of you interested in mathematics, technology, and information security have probably heard the name Randall Munroe. He is the creator of the XKCD webcomic which uses brilliant stick figure cartoons and a healthy... Read more

September 4, 2019
A Month After Poshmark Confirmed a Data Breach, Private User Information Is Sold Online screenshot

A Month After Poshmark Confirmed a Data Breach, Private User Information Is Sold Online

Almost exactly one month ago, North American online clothing marketplace Poshmark announced that it had suffered a data breach. For reasons that remain unclear, the website decided not to disclose how many people got... Read more

September 4, 2019
Do We All Use the Same Calendar? screenshot

Do We All Use the Same Calendar?

What day is it today? Many of you will most likely say 'September 3, 2019'. But how did we end up deciding that? And how did most of us end up agreeing with it? And what about the people that don't agree with this... Read more

September 3, 2019
What Is a DDoS Attack and How to Avoid It screenshot

What Is a DDoS Attack and How to Avoid It

Directed denial of Service, or simply "DDoS" attacks, are designed to take down a platform or web page and interrupt the service it provides. This temporary loss of service is caused by overloading a single website... Read more

September 3, 2019
Hackers Can Turn Headphones into 'Acoustic Weapons,' Cybersecurity Expert Warns screenshot

Hackers Can Turn Headphones into 'Acoustic Weapons,' Cybersecurity Expert Warns

The speakers on your smartphone, PC, and other devices connected to the internet could be weaponized by hackers and used against you, security researchers say. One such expert believes that it is a very real threat.... Read more

September 3, 2019
How Slack Phishing Works to Harvest Personal Data and how to Prevent It screenshot

How Slack Phishing Works to Harvest Personal Data and how to Prevent It

The sad reality of 2019 is that phishing is no longer just an email security problem. For a while now it has been a communication security problem—and statistics indicate that said problem is growing. In spite of... Read more

September 2, 2019
Hackers Prove How Easy It Is to Take over Twitter Accounts by Hijacking Jack Dorsey's Profile screenshot

Hackers Prove How Easy It Is to Take over Twitter Accounts by Hijacking Jack Dorsey's Profile

What are the consequences of a compromised social network account? It's fair to say that it largely depends on who owns the said account. For most regular users, it's but an inconvenience which, provided they pay... Read more

September 2, 2019
Hackers Drop Malware Using a Spreadsheet Called 'The Worst 25 Passwords' screenshot

Hackers Drop Malware Using a Spreadsheet Called 'The Worst 25 Passwords'

Back in the day, scams were all about social engineering – confidence artists needed to convince their victims, to woo them in a particular way in order to part them from their cash. Things are somewhat different... Read more

August 30, 2019
Keep Your Info Safe: Now Is the Time to Know Emerging Cyber Threats screenshot

Keep Your Info Safe: Now Is the Time to Know Emerging Cyber Threats

Because of the ever-expanding spread of digital technologies across the world, authorities must hasten the modernization of law enforcement agencies in addition to building an integrated cybercrime management... Read more

August 30, 2019
How to Prevent Pretexting Attacks screenshot

How to Prevent Pretexting Attacks

What is Pretexting? Pretexting is some other form of social engineering where hackers attempt to create a good pretext, or a fictional scenario, which they can use to attempt to rob their targets of their private... Read more

August 29, 2019
How to Set up and Use Microsoft Authenticator Qr Code screenshot

How to Set up and Use Microsoft Authenticator Qr Code

Microsoft Authenticator is an account verification app that lets you sign in to your Microsoft account with greater security while being very easy to use. These days we have to juggle so many different passwords for... Read more

August 27, 2019
What is the Difference Between Passwords and PINs screenshot

What is the Difference Between Passwords and PINs

Historically, passwords have seen a lot of use since ancient times. The first verified use of passwords in the Roman military, where they were used to establish security and assure discipline – and they seem to have... Read more

August 27, 2019
How to Delete User Accounts in Windows 10 screenshot

How to Delete User Accounts in Windows 10

Your Windows 10 user profile is basically a set of files and folders where all of your personal preferences, app settings, documents, and other data are stored. Every Windows 10 user account has a corresponding user... Read more

August 26, 2019
Should We End Daylight Saving Time? screenshot

Should We End Daylight Saving Time?

It's safe to say that probably all of you have heard of Daylight Saving Time (DST), and you might have also seen opponents trying to convince everybody that the concept is ancient and should be abolished entirely. But... Read more

August 26, 2019
What's a Recruiting Scam, and How Does it Work? screenshot

What's a Recruiting Scam, and How Does it Work?

Even though recent years have seen tremendous advancements in the field of online security and combatting online fraudsters, cyber-criminals don't seem to have relented. On the contrary – they just find new and more... Read more

August 22, 2019
FNB Decided to Disable Autofill for Passwords, but Then Immediately Changed Its Mind screenshot

FNB Decided to Disable Autofill for Passwords, but Then Immediately Changed Its Mind

Picking the bank that will take care of our personal finances is not a choice we make lightly. After all, we often give this organization our life savings, and we want to make sure that they are in safe hands. It's... Read more

August 22, 2019
WhatsApp Spyware Update: It Can Now Steal Your Data from Facebook, Microsoft, Amazon, Google, and Apple screenshot

WhatsApp Spyware Update: It Can Now Steal Your Data from Facebook, Microsoft, Amazon, Google, and Apple

Our mobile phones and computers store lots of personal and sensitive information, and it is not a secret that nowadays cybercriminals are incredibly interested in stealing such data. Thus, the need to secure data... Read more

August 22, 2019
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 65