Flurry of new Mac malware drops in December

Multiple new pieces of Mac malware have appeared in December, all distributed through different means, but all opening backdoors on infected computers.

Read more

Sextortion emails: They’re probably not watching you

Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.

Read more

Information operations on Twitter: new data released on election tampering

New information released by Twitter sheds fresh light on the various professional troll campaigns deployed alongside the 2016 presidential elections.

Read more

100 channels and nothing on, except TV Licensing phishes

A recent bout of TV Licensing phishing emails promise British users a refund once they log in to a phony TV License website and provide payment details. Read on to see if you’ve been impacted.

Read more

6 sure signs someone is phishing you—besides email

Beyond the medium used to reach you (which is most often email), what are some of the common signs and behaviors of phishing? Conversations that focus on the inbox only leave users with an inadequate understanding of how to protect against this ubiquitous threat.

Read more

HMRC phish swipes email login, payment details

It isn’t tax season for UK (or US) residents, but that hasn’t deterred scammers from sending out an HMRC phish double whammy with a tight deadline attached.

Read more

Is two-factor authentication (2FA) as secure as it seems?

Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed?

Read more

A week in security (July 30 – August 5)

A roundup of the security news from July 30 – August 5, including cryptomining, big data, social engineering, and more.

Read more

Social engineering attacks: What makes you susceptible?

Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susceptible to social engineering attacks, and what to do to combat them.

Read more

Exploring the virtual worlds of advergaming

With a spot of tracking-related controversy ruffling feathers in gaming circles, now is a good time to become familiar with some of the advertising methods used for, and in, video games. Ladies and gents, welcome to advergaming.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language