A business’s reputation takes years to build. With the current climate of data breaches, destroying it can take only seconds. What can businesses do to protect their brands from fallout following a cybersecurity incident? We answer these questions and more.
While many tech-savvy folks are familiar with two-factor authentication (2FA), more are unaware that there are several ways around it. A tool called Modlishka, the English pronunciation for the Polish word for “mantis,” is the latest in this list.
Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.
New information released by Twitter sheds fresh light on the various professional troll campaigns deployed alongside the 2016 presidential elections.
A recent bout of TV Licensing phishing emails promise British users a refund once they log in to a phony TV License website and provide payment details. Read on to see if you’ve been impacted.
Beyond the medium used to reach you (which is most often email), what are some of the common signs and behaviors of phishing? Conversations that focus on the inbox only leave users with an inadequate understanding of how to protect against this ubiquitous threat.
Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed?