Internet safety tips for kids and teens: A comprehensive guide for the modern parent
There are certain things your kids should never grow out of. And two of these are following great cybersecurity and privacy practices.
What’s the real value—and danger—of smart assistants?
Smart assistants are programmed to eavesdrop on you in order to await commands. Sometimes they’re dangerous, and other times downright hilarious. What’s the real value in these devices?
Can we trust our online project management tools?
Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way?
Social media: A treasure trove of spam and scams
How do spammers know how to target you for scams? They use social media to produce the most convincing types of spam.
DDoS attacks are growing: What can businesses do?
How do DDoS attacks work? And how do we protect our organizations from the growing size and number of attacks?
A cure for the common cold call: freeze them out
Cold calls are a modern day nuisance becoming ever-more persistent. In this article, we show you how to limit the number of cold calls you receive and prevent potential damage they may inflict.
Bank robbers 2.0: digital thievery and stolen cryptocoins
A new generation of thieves, bank robbers 2.0, seek to steal huge amounts of money as anonymously as they can. So they’ve developed a multitude of ways to pilfer cryptocurrency.
Stolen security logos used to falsely endorse PUPs
To gain the trust of users, the makers of PUPs put the logos of reputable security and tech firms on their websites to imply their product is endorsed by the companies. They are not.
New Chrome and Firefox extensions block their removal to hijack browsers
Two new extensions in Firefox and Chrome force install then hide from the user. Learn how you can protect yourself against them and remove them manually.
Analyzing malware by API calls
As an alternative to reverse engineering malware that is protectively packed, we look at the option of analyzing malware by API calls to determine what a file might be up to.