Zombie email rises from grave after eight years of radio silence

What do you do when an email account you assumed was long gone comes back to life after eight years?

Read more

Collection 1 data breach: what you need to know

In what’s being dubbed one of the largest data dumps in history, Collection 1 contains the data of over 770 million people. But is it really as bad as it sounds? We take a closer look and let users know what to do if their info is caught up in the mix.

Read more

A week in security (January 7 – 13)

A roundup of last week’s security news from January 7 to 13, including breaches, takedowns, bug fixes, and social media issues.

Read more

A week in security (December 10 – 16)

A roundup of last week’s security news from December 10–16, including facial recognition technology, abandoned USB sticks, even more trouble at Facebook, Google bugs, and more.

Read more

Is FIDO the future instrument to prove our identity?

FIDO, which stands for Fast Identity Online, is set of standards that enable simpler and more secure user authentication across websites and mobile services. Does this mean the end of passwords? Time will tell.

Read more

Twitter security snafu: change your passwords

A recent error caused passwords to be exposed internally at Twitter. As a precaution, they’re advising all users to change their passwords. Read on to find out what happened, and what you can do about it.

Read more

Why you don’t need 27 different passwords

People have to remember an average of 27 different passwords today—and they need to be long, not obvious, have special characters, and you can’t write them down. We’re here to tell you: stop doing that. Here’s how you can protect your data and your sanity without having to remember all those passwords.

Read more

A week in security (Feb 20th – Feb 27th)

A compilation of notable security news and blog posts from the 20th of February to the 27th of February. This week, we look back at tech support scams, tax tips, updating your social media privacy settings, and more.

Read more

Understanding the basics of two-factor authentication

With data breaches resulting in leaked passwords occurring almost daily, two-factor authentication has become an essential tool in the security toolkit.

Read more

#Hackedbyseb: musical (password) chairs

Singers will often use inventive ways to gain attention from an audience, or even draw new fans in. One trend in pop circles seems to be gaining popularity, but it might not be the best hype train to hop aboard. What could go wrong by sending your favourite singer login credentials to have them post a cool message from your account? Quite a bit, actually…

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language