What’s the real value—and danger—of smart assistants?

Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they’re dangerous, and other times downright hilarious. What’s the real value in these devices?

Read more

Can we trust our online project management tools?

Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way?

Read more

Social media: A treasure trove of spam and scams

How do spammers know how to target you for scams? They use social media to produce the most convincing types of spam.

Read more

DDoS attacks are growing: What can businesses do?

How do DDoS attacks work? And how do we protect our organizations from the growing size and number of attacks?

Read more

A cure for the common cold call: freeze them out

Cold calls are a modern day nuisance becoming ever-more persistent. In this article, we show you how to limit the number of cold calls you receive and prevent potential damage they may inflict.

Read more

Bank robbers 2.0: digital thievery and stolen cryptocoins

A new generation of thieves, bank robbers 2.0, seek to steal huge amounts of money as anonymously as they can. So they’ve developed a multitude of ways to pilfer cryptocurrency.

Read more

Stolen security logos used to falsely endorse PUPs

To gain the trust of users, the makers of PUPs put the logos of reputable security and tech firms on their websites to imply their product is endorsed by the companies. They are not.

Read more

New Chrome and Firefox extensions block their removal to hijack browsers

Two new extensions in Firefox and Chrome force install then hide from the user. Learn how you can protect yourself against them and remove them manually.

Read more

Analyzing malware by API calls

As an alternative to reverse engineering malware that is protectively packed, we look at the option of analyzing malware by API calls to determine what a file might be up to.

Read more

Using ILSpy to analyze a small adware file

ILSpy is an open-source .NET assembly browser and decompiler. We demonstrate its use looking at a simple adware file.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language