
What Hackers Do After Gaining Access to a Website
What are Hackers' objectives? Hackers usually infect websites with malware. Malware can execute many complex and malicious actions on a website, such as malvertising, illegal downloads, ransomware, and more. Online... Read more

It Was Confirmed: XKCD Users' Passwords Were Breached During a Data Breach
Those of you interested in mathematics, technology, and information security have probably heard the name Randall Munroe. He is the creator of the XKCD webcomic which uses brilliant stick figure cartoons and a healthy... Read more

A Month After Poshmark Confirmed a Data Breach, Private User Information Is Sold Online
Almost exactly one month ago, North American online clothing marketplace Poshmark announced that it had suffered a data breach. For reasons that remain unclear, the website decided not to disclose how many people got... Read more

Do We All Use the Same Calendar?
What day is it today? Many of you will most likely say 'September 3, 2019'. But how did we end up deciding that? And how did most of us end up agreeing with it? And what about the people that don't agree with this... Read more

What Is a DDoS Attack and How to Avoid It
Directed denial of Service, or simply "DDoS" attacks, are designed to take down a platform or web page and interrupt the service it provides. This temporary loss of service is caused by overloading a single website... Read more

Hackers Can Turn Headphones into 'Acoustic Weapons,' Cybersecurity Expert Warns
The speakers on your smartphone, PC, and other devices connected to the internet could be weaponized by hackers and used against you, security researchers say. One such expert believes that it is a very real threat.... Read more

How Slack Phishing Works to Harvest Personal Data and how to Prevent It
The sad reality of 2019 is that phishing is no longer just an email security problem. For a while now it has been a communication security problem—and statistics indicate that said problem is growing. In spite of... Read more

Hackers Prove How Easy It Is to Take over Twitter Accounts by Hijacking Jack Dorsey's Profile
What are the consequences of a compromised social network account? It's fair to say that it largely depends on who owns the said account. For most regular users, it's but an inconvenience which, provided they pay... Read more

Hackers Drop Malware Using a Spreadsheet Called 'The Worst 25 Passwords'
Back in the day, scams were all about social engineering – confidence artists needed to convince their victims, to woo them in a particular way in order to part them from their cash. Things are somewhat different... Read more

Keep Your Info Safe: Now Is the Time to Know Emerging Cyber Threats
Because of the ever-expanding spread of digital technologies across the world, authorities must hasten the modernization of law enforcement agencies in addition to building an integrated cybercrime management... Read more

How to Prevent Pretexting Attacks
What is Pretexting? Pretexting is some other form of social engineering where hackers attempt to create a good pretext, or a fictional scenario, which they can use to attempt to rob their targets of their private... Read more

How to Set up and Use Microsoft Authenticator Qr Code
Microsoft Authenticator is an account verification app that lets you sign in to your Microsoft account with greater security while being very easy to use. These days we have to juggle so many different passwords for... Read more

What is the Difference Between Passwords and PINs
Historically, passwords have seen a lot of use since ancient times. The first verified use of passwords in the Roman military, where they were used to establish security and assure discipline – and they seem to have... Read more

How to Delete User Accounts in Windows 10
Your Windows 10 user profile is basically a set of files and folders where all of your personal preferences, app settings, documents, and other data are stored. Every Windows 10 user account has a corresponding user... Read more

Should We End Daylight Saving Time?
It's safe to say that probably all of you have heard of Daylight Saving Time (DST), and you might have also seen opponents trying to convince everybody that the concept is ancient and should be abolished entirely. But... Read more

What's a Recruiting Scam, and How Does it Work?
Even though recent years have seen tremendous advancements in the field of online security and combatting online fraudsters, cyber-criminals don't seem to have relented. On the contrary – they just find new and more... Read more

FNB Decided to Disable Autofill for Passwords, but Then Immediately Changed Its Mind
Picking the bank that will take care of our personal finances is not a choice we make lightly. After all, we often give this organization our life savings, and we want to make sure that they are in safe hands. It's... Read more

WhatsApp Spyware Update: It Can Now Steal Your Data from Facebook, Microsoft, Amazon, Google, and Apple
Our mobile phones and computers store lots of personal and sensitive information, and it is not a secret that nowadays cybercriminals are incredibly interested in stealing such data. Thus, the need to secure data... Read more