100 channels and nothing on, except TV Licensing phishes

A recent bout of TV Licensing phishing emails promise British users a refund once they log in to a phony TV License website and provide payment details. Read on to see if you’ve been impacted.

Read more

A week in security (September 17 – 23)

A roundup of the security news from September 17–23, including Android scams, massive WordPress compromises, and high fines for Equifax.

Read more

6 sure signs someone is phishing you—besides email

Beyond the medium used to reach you (which is most often email), what are some of the common signs and behaviors of phishing? Conversations that focus on the inbox only leave users with an inadequate understanding of how to protect against this ubiquitous threat.

Read more

A week in security (September 10 – 16)

A roundup of the security news from September 10–16, including omnichannel fraud, ways to get back at scammers, the security of 2FA, and partnerstrokas.

Read more

HMRC phish swipes email login, payment details

It isn’t tax season for UK (or US) residents, but that hasn’t deterred scammers from sending out an HMRC phish double whammy with a tight deadline attached.

Read more

Is two-factor authentication (2FA) as secure as it seems?

Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed?

Read more

Social engineering attacks: What makes you susceptible?

Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susceptible to social engineering attacks, and what to do to combat them.

Read more

What’s in the spam mailbox this week?

We take a look at a few of the most notable spam emails in circulation over the last week, including a money muling scam, Apple phishes, and a sexploitation message featuring old, but real, passwords.

Read more

When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most of us, man-in-the-middle embodies something both familiar yet mysterious. Let’s get to know this threat a little bit better, shall we?

Read more

A week in security (June 25 – July 1)

A round up of the security news from June 25 – July 1, including a look at the EU cyber force proposal, cryptomining dialing things down, and the risks of handing out personal information online.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language