Ubiquiti breach, and other IoT security problems

Ubiquiti informed its customers about unauthorized access to its online customer portal. Here’s what you need to know.

Read more

Get a head start on defending against tax scams

We look at a major tax scam bust in the US, and think about ways to keep tax details safe for the next tax season.

Read more

Spotify resets some user logins after hacker database found floating online

The 380 million record database. didn’t belong to Spotify itself, but instead to fraudsters who’d uploaded it.

Read more

Scammers are spoofing bank phone numbers to rob victims

Phone scammers are using spoofed caller ID numbers to convince their victims they are employees of your bank. Don’t fall for their tricks.

Read more

Brute force attacks increase due to more open RDP ports

More open ports are inviting attackers to try and gain entry by using brute force attacks. Why is this happening and what can we do?

Read more

Report: Pandemic caused significant shift in buyer appetite in the dark web

The pandemic has had a ripple effect on all facets of life—even the criminal. A new report looks at how the dark web has changed post COVID.

Read more

Coordinated Twitter attack rakes in 100 grand

In a social engineering attack on Twitter, threat actors managed to scam $100,000 dollars in Bitcoin by taking over high-profile accounts.

Read more

What to do when you receive an extortion email

Extortion emails are nothing new, but with the recent increase in frequency, many people are looking for guidance. If you have received such a message and want to know how you should respond, you’re in the right place. Read on!

Read more

Disney+ security and service issues: Here’s what we know so far

The most anticipated streaming service Disney+ officially launched early last week. And while it was met with an overwhelming influx of users, there were also a myriad of Disney+ security issues. Read on for the latest.

Read more

When can we get rid of passwords for good?

Passwords are a burden and security risk, especially when used as a single authentication method. Can we get rid of passwords once and for all? We list alternative authentication methods and discuss their pros and cons.

Read more

Select your language