Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When it comes to cybersecurity, journalists need to protect themselves, their sources, and the freedom of the press. Which methods should they use?

Read more

A week in security (October 7 – 13)

A look at the cybersecurity news from October 7 – 13, including updates on war shipping, managed service providers, and stalkerware.

Read more

Securing the managed service provider (MSP)

Managed service providers (MSPs) have become the target of attacks, as lack of aggressive security posturing has left them—and the high-value data of their clients—vulnerable. Learn how MSPs can secure against a rising tide of threats.

Read more

How security orchestration improves detection and response

Security orchestration is a regulator that makes sure security solutions, often from different vendors, work well together to automate response and keep organizations safe.

Read more

Data and device security for domestic abuse survivors

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Read more

Mobile Menace Monday: Dark Android Q rises

The Android Q operating system is being developed with privacy and security in mind. We take a look at both, examining new features intended for giving users better control of their devices and data.

Read more

A week in security (April 8 – 14)

A roundup of news stories from April 8–14, including Baldr, medical management apps, an Android password stealer, and new sextortion scams.

Read more

Government shutdown impacts .gov websites, puts Americans in danger

Today, TechCrunch posted a concerning story about the shutdown and most importantly, they covered the reporting of NetCraft, a U.K. internet service company, about how numerous US government websites are now inaccessible due to expired security certificates. This is going to be a quick post to help explain what happened and more importantly, how cyber criminals will use this situation to their advantage.

Read more

Smart speakers: Christmas treat or lump of coal?

If you’re interested in buying smart speakers this Christmas, you may be wondering how much of a privacy problem they really are. We take a look at this popular holiday present and separate the hype from the real issues at hand.

Read more

Google logins: JavaScript now required

Google now requires users to enable JavaScript before logging in for extra security measures. But wait, hasn’t JavaScript been used in cyberattacks? We take a look at the impact of Google’s decision.

Read more

Select your language