Crypto-scams you should be steering clear of in 2021

We look at the most common cryptocurrency scams of 2021, explain the risks, and highlight some of the warning signs.

Read more

A week in security (July 12 – July 18)

A roundup of all the most interesting cybersecurity news stories, articles, and happenings of the previous seven days.

Read more

Is crypto’s criminal rollercoaster approaching a terminal dip?

We look at whether the current environment will eventually become unsustainable for those wanting to exert others with ransomware.

Read more

A week in security (June 28 – July 4)

A roundup of all the most interesting cybersecurity news stories, articles, and happenings of the previous seven days.

Read more

Microsoft Exchange attacks cause panic as criminals go shell collecting

The ProxyLogon vulnerability in Microsoft Exchange has moved from an Advanced Persistent Threat to cybercrime’s new toy in record time.

Read more

A week in security (June 3 – 9)

A weekly roundup of security news from June 3–9, including Magecart, breaches, hyperlink auditing, Bluekeep, FTC, and facial recognition.

Read more

Labs Cybercrime Tactics and Techniques report finds businesses hit with 235 percent more threats in Q1

The Labs team discovered that businesses are being targeted with 235 percent more threats than the previous year. Download the report and find out which threats are revving up, and which are dying out.

Read more

All the reasons why cybercriminals want to hack your phone

Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.

Read more

The 25th anniversary of the webcam: What did it bring us?

This month the webcam has been around for 25 years. How has it developed and which are the concerns surrounding webcams and CCTVs?

Read more

Mac cryptocurrency ticker app installs backdoors

A Mac application named CoinTicker has been found installing two different backdoors, capable of keylogging, data theft, execution of arbitrary commands, and more.

Read more

Select your language