News

Steps Every Outlook User Must Take in the Wake of a Major Security Breach screenshot

Steps Every Outlook User Must Take in the Wake of a Major Security Breach

Last Friday, Outlook users started receiving breach notification emails from Microsoft which, in addition to telling them that an unknown attacker has accessed some of the information in their inbox, informed them...

Read more
April 17, 2019
It Takes Hackers 60 Seconds to Find and Attack a Vulnerable Server screenshot

It Takes Hackers 60 Seconds to Find and Attack a Vulnerable Server

Movies and, to a certain extent, mainstream media would have us believe that organizing a cyberattack involves a lot of planning, plenty of resources, and a teenage computer geek who's in a bad mood all the time. This...

Read more
April 17, 2019
Do Not Fall for Fake Instagram Helper Apps That Can Steal Your Password screenshot

Do Not Fall for Fake Instagram Helper Apps That Can Steal Your Password

Why are social networks so successful? Well, in short, they are thriving because people spend quite a lot of time using them. And people do this because they're interested in what the rest of the world thinks about...

Read more
April 16, 2019
What Is Instagram's Nasty List and What to Do If You're on It? screenshot

What Is Instagram's Nasty List and What to Do If You're on It?

If you're told that you've ended up on Instagram's 'Nasty List', you'll likely want to know what the reason for this is. A 'Nasty List' sounds like a list of accounts that have done something wrong, so, especially if...

Read more
April 16, 2019
There's a Fake Google Wallet App, and It Is Used to Hijack Google Accounts screenshot

There's a Fake Google Wallet App, and It Is Used to Hijack Google Accounts

You could argue that Google is the classic Silicon Valley success story. What started off as a useful search engine is now a commanding part of almost everything we do online. Over the years, Google released apps and...

Read more
April 15, 2019
What Is a Google Security Key and How Does It Work with Your Android 7.0+ Phone? screenshot

What Is a Google Security Key and How Does It Work with Your Android 7.0+ Phone?

Google's security people reckon that they know a thing or two about Two-Factor Authentication (2FA) or 2-Step Verification, as they like to call it. They think that the most secure 2FA systems are the ones based on a...

Read more
April 15, 2019
What Is a Baldr Data Stealer and How to Protect Your Passwords Against It screenshot

What Is a Baldr Data Stealer and How to Protect Your Passwords Against It

Baldr is the name of a new family of information-stealing malware. Its authors first introduced it to cybercriminal circles in January, and about a month later, Microsoft's security team reported that they have seen...

Read more
April 12, 2019
99 Phishing Sites but Microsoft Did Not Leave One screenshot

99 Phishing Sites but Microsoft Did Not Leave One

A phishing website is a wonderful instrument for virtual schemers. Once a phishing website is set up, the attackers can trick gullible visitors into disclosing personal information or interacting with unreliable or...

Read more
April 12, 2019
A Mobile Application Exposed Passwords and Enabled Car Theft screenshot

A Mobile Application Exposed Passwords and Enabled Car Theft

As you probably know, the tendency to connect everyday objects to the internet is often referred to as the Internet of Things (IoT) revolution, and although nowadays, we ought to be rather careful when using words...

Read more
April 11, 2019
Millions of Facebook and Instagram Passwords Were Left in Plain Sight. What Now? screenshot

Millions of Facebook and Instagram Passwords Were Left in Plain Sight. What Now?

If you are an avid Facebook or Instagram user, you definitely know that signing into your accounts has never been easier. All of your devices can sign you in automatically, when your passwords are saved in your...

Read more
April 11, 2019
What Is a Two-Factor Authentication Phishing Attack? screenshot

What Is a Two-Factor Authentication Phishing Attack?

When you leave your home, do you just leave the light on to trick thieves into thinking that someone’s home, or do you lock all doors and windows? When you park your car, do you lock it but leave the window open, or...

Read more
April 11, 2019
A Vulnerability in Xiaomi's Guard Provider App Could Expose Devices to Malware screenshot

A Vulnerability in Xiaomi's Guard Provider App Could Expose Devices to Malware

Many people assume that the only thing they need to do to protect their devices is to install some sort of security software. They tend to view anti-malware products as a panacea that can guarantee the safety of their...

Read more
April 5, 2019
Two Leaky Databases Left over 540 Million Facebook User Records Publicly Accessible screenshot

Two Leaky Databases Left over 540 Million Facebook User Records Publicly Accessible

For a while now, Facebook has been making headlines for all the wrong reasons. Last month, security reporter Brian Krebs revealed that the passwords of hundreds of millions of people had been stored in plaintext in...

Read more
April 5, 2019
More Than 100,000 Were Trapped by a New Spam Campaign screenshot

More Than 100,000 Were Trapped by a New Spam Campaign

According to Statista, on average, we send and receive more than 280 billion emails every day. Any sort of analysis of such an astronomical amount of information would be difficult, but despite this, researchers have...

Read more
April 4, 2019
Why Is Facebook Asking for Email Passwords? screenshot

Why Is Facebook Asking for Email Passwords?

How much does Facebook know about you? Different people will give different answers. If you don't have a Facebook account, for example, you are likely to say that the world's largest social network knows nothing about...

Read more
April 3, 2019
Toyota Reveals a Second Major Data Breach Within Two Months screenshot

Toyota Reveals a Second Major Data Breach Within Two Months

As you probably know, when a company with millions of customers issues an official announcement that contains the statement 'we take security very seriously', the said company has most likely been a victim of a...

Read more
April 3, 2019
Small Businesses Become the Favorite Target of Cyber Criminals Looking for Identity Records screenshot

Small Businesses Become the Favorite Target of Cyber Criminals Looking for Identity Records

Like it or not, cybercriminals breach online services every day and steal personal information of millions of regular users like you. The data is later sold for a profit and/or abused it in a variety of different...

Read more
April 2, 2019
Beware of Malware That Is Spread via LinkedIn DMs screenshot

Beware of Malware That Is Spread via LinkedIn DMs

There seems to be not a single platform that hackers and cyber attackers are not ready to exploit. They can expose you to malware via your own email inbox. They can create fictitious websites to expose you to scams....

Read more
April 1, 2019