By training your kids’ social media feeds, you can fill them with educational content.
You’ve locked down your home network. Now what?
This week, Dave and Jeff talk about Zoom-bombers, Donald Trump hackers, and some Scouts tackling fake news.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Jeff sits down with Povel Torudd and Alejandro Arango to discuss the new documentary from Tomorrow Unlocked, “From Kurils with Love.”
We explain for laypeople what end-to-end encryption is and how it enables private, secure communication for us all.
Our experts analyzed sophisticated attacks and APT campaigns targeting Linux, and they provided some security recommendations.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
Cybercriminals have adopted the marketing tool for information collection.
Modern computerized car require a secure-by-design platform. And that’s just what we’ve come up with.
The mass transition to working from home clearly shows the best technologies for a secure and convenient remote environment.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
The DeathStalker group targets relatively small companies and their trade secrets.
Is your Wi-Fi a bit wobbly? Here are some easy tips to overcome the problem.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.
Your online finances need proper protection. Learn how to secure your PayPal account.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
Another reason not to share everything online.
Five things that, if neglected, can cost SMBs dearly.
What you need to check regularly to keep your Android smartphone and your data safe and sound.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
How to protect your Instagram account and personal photos from prying eyes.