How to stay safe from phishing
As you wake up in the morning feeling sleepy and preoccupied, you…
How secure are authenticator apps?
Information security experts have long agreed that the most reliable form of…
How cybercriminals tailor attacks for different age groups of gamers
These days, a 12 or 13-year-old kid can become a professional eSports…
“On the Line”, a cybercrime movie
Ever seen a movie adaptation of a cybersecurity glossary? I did recently,…
“Fobo” Trojan distributed as ChatGPT client for Windows
The golden rule — “if something is popular, criminals will exploit it” — strikes…
How cybercriminals hijack Telegram accounts
Telegram users have recently begun encountering various Telegram messenger hijacking schemes. Things…
Recruitment fraud: how to recognize and avoid it
Fake jobs have been around for centuries. Even Sherlock Holmes himself encountered…
Your Site Isn’t Hacked By This Bitcoin Scam, Keep the Money
PSA: Your Site Isn’t Hacked By This Bitcoin Scam, Keep the Money…
3.5 Million Mail.ru Users Affected by Major Data Breach: What You Need to Know
On January 13, 2023, an unprecedented data breach occurred affecting millions of…
How Cloudflare Area 1 and DLP work together to protect data in email
Threat prevention is not limited to keeping external actors out, but also…