How to deal with BEC attacks
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
505 articles
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
MonitorMinor is one of the most dangerous spying apps for Android out there. Here’s why.
A brief but comprehensive guide to security and privacy on the world’s most popular gaming platform.
At the RSA Conference 2020 in San Francisco, a panel of experts discuss the issues with securing elections.
Listen to your cookies with the Listening Back browser extension to understand the real scale of Web tracking.
We tell you which security and privacy settings will hold Twitter hackers and spammers at bay.
We reveal the best settings for protecting your profile from hackers, haters, and spammers.
Under the pretext of compensation for data leaks, fraudsters are selling “temporary U.S. social security numbers.”
Exploring front-running to capture the Gemini dollar’s antispam stake.
How to protect your Instagram account and personal photos from prying eyes.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
Psychologist Emma Kenny’s advice on how to keep children safe online in the digital age.
Scammers prey on people’s kindness. We tell you how to distinguish them from those who are truly in need.
The truth about the recently discovered — and already fixed — bug in Kaspersky consumer products.
Many swear phones secretly listen in through their built-in microphones. We investigate the claims — and offer other explanations for spookily precise mobile ads.
Apple to roll out a system of its own for quick login to websites and apps. Learn what makes it different from similar offers.
We explain how to leave the social network while keeping some posts as a memento, even if you forgot your password and changed your phone number.
A guide on how to protect your account against spammers, hackers, and other gate-crashers.
Scammers are using Google Calendar, Photos, Drive, and other services to distribute spam. Here’s how it works.