While many tech-savvy folks are familiar with two-factor authentication (2FA), more are unaware that there are several ways around it. A tool called Modlishka, the English pronunciation for the Polish word for “mantis,” is the latest in this list.
Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.
New information released by Twitter sheds fresh light on the various professional troll campaigns deployed alongside the 2016 presidential elections.
A recent bout of TV Licensing phishing emails promise British users a refund once they log in to a phony TV License website and provide payment details. Read on to see if you’ve been impacted.
Beyond the medium used to reach you (which is most often email), what are some of the common signs and behaviors of phishing? Conversations that focus on the inbox only leave users with an inadequate understanding of how to protect against this ubiquitous threat.
Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed?
Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susceptible to social engineering attacks, and what to do to combat them.