Computer Security

Which Two-Factor Authentication Option Is the Best? screenshot

Which Two-Factor Authentication Option Is the Best?

On the face of it, two-factor authentication (2FA) is a ruthlessly simple and incredibly effective security feature. In essence, by implementing two-factor authentication, you ensure that an attacker can't take over a... Read more

April 16, 2020
How Does the New York SHIELD Act Affect the Privacy of Our Private Data? screenshot

How Does the New York SHIELD Act Affect the Privacy of Our Private Data?

Somewhat understandably, the current coronavirus pandemic means that not that many people are thinking about data security at the moment. Nevertheless, the virus will be defeated (hopefully) soon, and we'll need to... Read more

April 7, 2020
Hijacked Routers Used to Spread Coronavirus Malware-Ridden Apps screenshot

Hijacked Routers Used to Spread Coronavirus Malware-Ridden Apps

We are living through a pandemic, and in this time of unrest, panic surrounding Coronavirus has yet to subside. People feel uneasy and scared of what's to come. In these frightening times, cybercriminals thrive.... Read more

April 3, 2020
Downloading Pirated Software Is Not Only Illegal but Also Dangerous screenshot

Downloading Pirated Software Is Not Only Illegal but Also Dangerous

Where do you go when you want to install a new program or a new game? Hopefully, you are relying on legitimate download websites and you are doing your research before committing to anything. Note that if you end up... Read more

April 1, 2020
Breach Candy Hospital Leaves 121 Million Patients' Records Exposed screenshot

Breach Candy Hospital Leaves 121 Million Patients' Records Exposed

We expect companies that handle our most personal information to take every possible safety precaution to protect us from cybercriminals. However, not all organizations take cyber security seriously even if they are... Read more

March 30, 2020
'I Got Phished' Promises to Notify the Victims of Phishing Scams screenshot

'I Got Phished' Promises to Notify the Victims of Phishing Scams

If most of your work tasks are performed online, you probably encounter phishing emails from time to time. Everyone knows (at least in theory) that they need to avoid phishing, but sometimes it is hard to tell... Read more

March 30, 2020
1 Billion WI-Fi Connected Devices Are Vulnerable Due to a Security Vulnerability screenshot

1 Billion WI-Fi Connected Devices Are Vulnerable Due to a Security Vulnerability

IoT is the future, or so we're being told all the time - with technology not so much marching, but rather frog leaping into orbit, smart homes and interconnected appliances that you can command at will from your phone... Read more

March 30, 2020
Coronavirus Scam Uses a Fake COVID-19 Map Pushing an App That Lets Cybercrooks Spy on You Through Your Phone screenshot

Coronavirus Scam Uses a Fake COVID-19 Map Pushing an App That Lets Cybercrooks Spy on You Through Your Phone

We are currently living through a pandemic. Coronavirus is spreading rapidly and has become a global issue. People are scared, and the news is only adding to that fear. Every time you turn on a TV, open a site, or any... Read more

March 25, 2020
Rainbow Table Password Attack - What Is It and How Do You Protect Yourself From It screenshot

Rainbow Table Password Attack - What Is It and How Do You Protect Yourself From It

A rainbow table is just one of the many potent tools in the arsenal of the cybercriminals of today. While a rainbow table password attack has its limitations, it does give hackers the opportunity to effectively steal... Read more

March 24, 2020
Scam Alert - Watch out for Fake Walmart Password Reset Email screenshot

Scam Alert - Watch out for Fake Walmart Password Reset Email

Nowadays, technology does not so much march forward as skyrockets into new and unexpected directions at a staggering speed. Using the Internet is practically a necessity for business and personal matters.... Read more

March 13, 2020
What Is Juice Jacking? Is It Safe to Use Public USB Ports? screenshot

What Is Juice Jacking? Is It Safe to Use Public USB Ports?

You're in a public place, you need to use your smartphone, but you've forgotten to charge it up before you left home. You don't have a charger, and you've never really grown used to carrying bulky power banks with... Read more

March 10, 2020
$405 Million Has Been Stolen From Military Veterans Using Scams Since 2012 screenshot

$405 Million Has Been Stolen From Military Veterans Using Scams Since 2012

When it comes to fraudsters, they feel no shame as they prey on the most vulnerable people like military veterans who, for example, might require money or might be unable to say no to other soldiers in need. According... Read more

March 10, 2020
Have You Reached Full Gmail Potential? A

Have You Reached Full Gmail Potential? A "Good Enough" Password Won't Do the Trick

If you don’t have a Gmail account, you must be very independent and self-sufficient. Or perhaps you’ve been living in a taiga all this time. Either way, it is a lot more common to have several Gmail accounts these... Read more

March 9, 2020
What Is a Homograph Attack and How to Protect Yourself Against It? screenshot

What Is a Homograph Attack and How to Protect Yourself Against It?

Security news website The Register recently wrote about a new zero-day vulnerability that could allow what is known as a 'homograph attack,' and Shaun Nichols, the report's author, was quite surprised and a bit... Read more

March 9, 2020
HMRC Reminds People to Watch out for Scams and Fraud Ahead of the 2020 Tax Season screenshot

HMRC Reminds People to Watch out for Scams and Fraud Ahead of the 2020 Tax Season

If you live in the United Kingdom, you know that a new tax season is about to begin, as the 2019/2020 tax year is ending on April 5th. Although tax scams are prevalent throughout the year, they always become more... Read more

March 6, 2020
What Is Pharming and How to Protect Yourself From It? screenshot

What Is Pharming and How to Protect Yourself From It?

You could argue that there are a few significant similarities between pharming and phishing. In fact, many could confuse the two terms quite easily, which isn't really a surprise given that the ultimate goal is the... Read more

March 6, 2020
Would Hackers Go After Your Pets? Unfortunately, They Have That Option screenshot

Would Hackers Go After Your Pets? Unfortunately, They Have That Option

If you have a pet, you know what pantry items should be out of reach. You know not to leave them in a car on a sunny day. You know that doors and windows need to be closed to keep them inside. You know when their... Read more

February 24, 2020
MEMS Vulnerability Makes It Possible to Hijack Voice Assistants, Including Alexa, Google Home, or Siri screenshot

MEMS Vulnerability Makes It Possible to Hijack Voice Assistants, Including Alexa, Google Home, or Siri

Virtual assistants were created to perform various tasks to make our lives easier. Over the years, they have changed a lot, and, today, we even have voice assistants like Alexa and Siri that can control several smart... Read more

February 24, 2020