A week in security (February 17 – 23)

A roundup of the previous week’s most notable security stories and events, including cloud identity management, a noteworthy Twitter scam-tastrophy, RobbinHood ransomware, and more.

Read more

Social engineering attacks: What makes you susceptible?

Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susceptible to social engineering attacks, and what to do to combat them.

Read more

Bad romance: catphishing explained

You may have heard of catfishing, where people lure romancers online by faking their identity. But what about catphishing? This dangerous practice uses similar romantic triggers, only its goal is to dupe users and businesses out of personal info.

Read more

Select your language