Watch the (verified) birdie, or new ways to recognize fakes
Over the past 18 months or so, we seem to have lost…
Beekeeper vs. cybercrime
Did you know that cybersecurity and… beekeeping are like two peas in…
Is it the boss – or is it a fraudster? Scams disguised as urgent orders from top brass
Imagine getting a call or message from your immediate senior — or…
Apple fair: alternative app stores coming to iOS
iOS has been a mostly impenetrable fortress throughout the full 17 years…
Android Phishing Scam Using Malware-as-a-Service on the Rise in India
McAfee Mobile Research Team has observed an active scam malware campaign targeting…
Pig butchering: large-scale cryptocurrency fraud
Today, we’re discussing the increasingly common scam known as pig butchering. Due…
Neither flowers nor gifts: how women get scammed
Taking place every year on March 8 in many countries across the…
What crypto drainers are, and how to fend them off
A new category of malicious tools has been gaining popularity with crypto…
The cybersecurity threats to kids that parents should be aware of in 2024
In the era of modern technology, the age at which children are…
Resolutions for a cybersecure 2024
The rapid development of AI, international tensions, and the proliferation of “smart”…