Gamers level up with rewards for better security - We look at some recent attempts by game developers to increase account security, by encouraging gamers to use tools such as 2FA.
iPhone calendar spam attacks on the rise - Whatever Apple did in 2016 to stop a rash of calendar spam was working... until recently.
WhatsApp calls and messages will break unless you share data with Facebook - WhatsApp will remove core functions for users who refuse to share some of their data with Facebook,  rendering the app useless for some.
What is a honeypot? How they are used in cybersecurity - In security, a honeypot is a computer system used as bait for cyberattacks. Security professionals set these traps to learn how cybercriminals attack.
Newly observed PHP-based skimmer shows ongoing Magecart Group 12 activity - This skimmer is using a hybrid approach to bypass detection and target vulnerable e-commerce websites.
What does WiFi stand for? - What does WiFi stand for, how does it work, and how can you enhance the security of your public and home WiFi use? Read to learn more.
Using iPhones and AirTags to sneak data out of air-gapped networks - A researcher has discovered a method for exfiltrating data from air-gapped networks using Apple's Find My technology.
Why MITRE ATT&CK matters—Choosing alert quality over quantity - MITRE Engenuity's recent evaluation could make any business reconsider its cybersecurity strategy, but they shouldn't leap to conclusions.
FragAttack: New Wi-Fi vulnerabilities that affect… basically everything - A researcher has uncovered a set of vulnerabilities in the way Wi-Fi and connected devices handle data packet fragmentation and aggregation.

Select your language