
Dangerous investments: App Store scammers
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Kids use social networks and IMs a lot, and don’t keep in mind that the “internet remembers all”. How to reduce the digital footprint of your tiny beloved ones (even if they’re taller than you).
A few words on why desktop applications based on the Electron framework should be approached with caution.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
Dive into the depths of AI’s promised game-changing effects and also its perils, emerging AI threats, and our CEO’s vision for cyber immunity at our APAC Cybersecurity Weekend 2023.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
Received an attractive job offer from a stranger? Be careful! It could be a scam…