Common cybercriminal tricks for hijacking Office 365 accounts.
On this podcast, Dave and Jeff look at why Israel is using fish to fight hackers, why Google will pay for you to read news and how Facebook helped the FBI hack Tails OS.
An integrated approach arms even small companies with automated tools that repel complex attacks.
A few stories about how easy it is to accidentally leak sensitive information into the public domain.
At WWDC 2020, Apple rolled out App Clips for iOS. We explain what that — as well as Android Instant Apps — is.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Dave and Jeff discuss the underground trade of pirated OnlyFans porn, World of Warcraft bots, an alleged arsonist’s public posts getting her nabbed by the FBI, and more.
Zoom developers have made their service more secure. We review what’s changed.
Our experts uncovered a scheme to extract cardholder data using Google tools.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To protect ADAS from external interference, cars need a special approach to cybersecurity.
Common attack schemes targeting SMB employees.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
The abundance of work-related cloud tools and services calls for smart password handling.
Is your Wi-Fi a bit wobbly? Here are some easy tips to overcome the problem.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
Another reason not to share everything online.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
Be it Fortnite, League of Legends, or good old Archero, risks abound for online gaming. Learn about the threats so you can avoid them.
A brief but comprehensive guide to security and privacy on the world’s most popular gaming platform.
If you don’t want to pay for extra gigabytes in iCloud, try these other ways to backup your photos and other iPhone files.