A lightbulb is all the specialist equipment Lamphone needed to eavesdrop on a conversation in a soundproofed room.
Create a digital comfort zone using any old tablets, laptops, and modems you have on hand to work from home safely.
In this episode of the podcast, Dave and Jeff discuss Zoom bombings in court, Canon hit by ransomware, a US bounty for election interference, and more.
Our technologies prevented an attack. Expert analysis revealed the exploitation of two previously unknown vulnerabilities. What you need to know.
Your online finances need proper protection. Learn how to secure your PayPal account.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.
Life has made a dramatic shift online in 2020. Our solutions will help you avoid unnecessary stress in the new reality.
On this episode of the podcast, Dave and Jeff discuss large companies being hit with ransomware, the speedrunning world record, and more.
You can refuse some permissions to greedy games, and they most definitely do not need these five.
How APTs compromise the privacy and security of average citizens that they do not target directly.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Malware can masquerade not only as games and TV shows, but also as educational materials. We help you understand what this malware is and how to avoid being infected.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A close look at Pirate Matryoshka malware, and why even inveterate pirates should not download cracked software from torrent trackers.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Our experts’ detailed analysis of the prime suspect in the ransomware attack on Garmin.
What is Zero Trust, and why is it attractive for modern business?
The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.
Five things that, if neglected, can cost SMBs dearly.
Our experts detected a malware framework that cybercriminals use to attack various operating systems.
Microsoft has released a patch for a critical RCE vulnerability in Windows Server systems.
Is your Wi-Fi a bit wobbly? Here are some easy tips to overcome the problem.
Gain full control over your Zoom video conferences, family gatherings, and online bar crawls.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Our new VPN has a failsafe — if it can’t protect, you can’t connect.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
Have you ever received a letter from a Nigerian prince? A Nigerian astronaut? How about Daenerys Targaryen? If so, you know that we are talking about funny Nigerian spam — and this post covers it all!
What you need to check regularly to keep your Android smartphone and your data safe and sound.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
Be it Fortnite, League of Legends, or good old Archero, risks abound for online gaming. Learn about the threats so you can avoid them.
A brief but comprehensive guide to security and privacy on the world’s most popular gaming platform.