Tips & advice


3191 articles

Digital Security

AI security bubble already springing leaks

AI security bubble already springing leaks

Digital Security

AI security bubble already springing leaks

Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one

Cameron Camp16 Sep 2024


Video, Ransomware

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

Video, Ransomware

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

ESET research also finds that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends

Editor13 Sep 2024


Scams

6 common Geek Squad scams and how to defend against them

6 common Geek Squad scams and how to defend against them

Scams

6 common Geek Squad scams and how to defend against them

Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks

Phil Muncaster11 Sep 2024


Malware

In plain sight: Malicious ads hiding in search results

In plain sight: Malicious ads hiding in search results

Malware

In plain sight: Malicious ads hiding in search results

Sometimes there’s more than just an enticing product offer hiding behind an ad

Márk Szabó03 Sep 2024


Internet of Things

Old devices, new dangers: The risks of unsupported IoT tech

Old devices, new dangers: The risks of unsupported IoT tech

Internet of Things

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors

Márk Szabó27 Aug 2024


Video, Mobile Security

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

Video, Mobile Security

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure

Editor26 Aug 2024


Scams

Why scammers want your phone number

Why scammers want your phone number

Scams

Why scammers want your phone number

Your phone number is more than just a way to contact you – scammers can use it to target you with malicious messages and even exploit it to gain access to your bank account or steal corporate data

Márk Szabó13 Aug 2024


Privacy

The great location leak: Privacy risks in dating apps

The great location leak: Privacy risks in dating apps

Privacy

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance?

Tony Anscombe12 Aug 2024


Scams

Top 6 Craigslist scams: Don’t fall for these tricks

Top 6 Craigslist scams: Don’t fall for these tricks

Scams

Top 6 Craigslist scams: Don’t fall for these tricks

Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun

Phil Muncaster12 Aug 2024