How too-eager-to-please new employees get scammed
Scammers are using social engineering to shake down newly onboarded employees.
1066 articles
Scammers are using social engineering to shake down newly onboarded employees.
We explain why it’s best not to use desktop versions of messengers such as WhatsApp, Telegram, Signal and the like.
In recent years, small businesses have increasingly become the target of man-in-the-middle cyberattacks. Protect yourself by using a VPN.
And more importantly — how to stop your passwords from being used by cybercriminals.
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
Researchers have found vulnerabilities in the desktop client of the Signal messenger. Let’s see how dangerous they really are.
What to do if your secret messenger isn’t secret enough.
Many hacks have started during Christmas holidays. A few simple tips will reduce the chances of your company becoming the next victim.
Researchers find a new reliable way to track the location of wireless Wi-Fi devices.
A year after discovery, the Log4Shell vulnerability is still making itself felt.
We investigate the connection between software security and leaks when handling RAM.
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
An interesting bug in one of the most popular embedded DBMS.
What signs may indicate that a device is infected or being attacked by a hacker.
Which corporate assets should be first in line for protection against cyberattacks?
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
Servers with the Zimbra Collaboration suit installed are being attacked via an archive unpacking tool.
The top-4 technologies in use today that long belong in a museum.