Businesses: It’s time to implement an anti-phishing plan

If your organization doesn’t have an anti-phishing plan in place, it’s time to start thinking about one. Here’s what to tell your employees and customers about phishing attacks.

Read more

Sextortion Bitcoin scam makes unwelcome return

A well-worn sextortion scam is back in user’s inboxes. We explain what to look for and why recipients shouldn’t panic.

Read more

Data scraping treasure trove found in the wild

3 large databases containing scraped content landed in front of security researchers. How bad is it?

Read more

Compromising vital infrastructure: air traffic control

The aviation industry and air traffic (control) are vital elements of our infrastructure. While flying is reportedly safe, how does that landscape look cybersecurity-wise?

Read more

Phone spampocalypse: fighting back in the age of unwanted calls

US telecommunications companies have the technology to protect customers against the rising tide of unwanted calls—they just haven’t done it yet. So it’s up to lawmakers and consumers themselves to fight back against phone spampocalypse. Here’s how they’re doing it.

Read more

A month of giveaway spam on Twitter

We’ve observed a low level spam campaign working its way through Twitter, with just under 2,000 posts visible on public search since September 1. What’re they trying to sell this time? Some CBD oil!

Read more

5 safe ways to get back at spammers: a guide to wasting time

We take a look at some of the safe ways to waste a spammer’s time, whether by email or telephone.

Read more

Official Cardi B website plagued by spammers

Over the past few days, fans of singer Cardi B noticed her website was slowly filling up with spam. We take a look at what happened.

Read more

A week in security (July 30 – August 5)

A roundup of the security news from July 30 – August 5, including cryptomining, big data, social engineering, and more.

Read more

What’s in the spam mailbox this week?

We take a look at a few of the most notable spam emails in circulation over the last week, including a money muling scam, Apple phishes, and a sexploitation message featuring old, but real, passwords.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language