How to protect yourself from doxing

Doxing, or collecting and spreading private information about a user online, is a form of cyber harassment, stalking, and even a potential threat to physical safety. Here’s what you can do to protect yourself against it.

Read more

A week in security (October 14 – 20)

Cybersecurity news for October 14 – 20, including the future of the password, the lingering threat of ransomware, and new security features from Instagram.

Read more

Pulse VPN patched their vulnerability, but businesses are trailing behind

After a vulnerability in a popular business VPN solutions was discussed at length and an easy to use exploit is availbale, organizations still fail to apply the patch. What’s up?

Read more

300 shades of gray: a look into free mobile VPN apps

Mobile VPN apps are one of the best tools for protecting user privacy. Unfortunately, a notable number of are deemed unsafe. Read on to find out how to assess the best mobile VPN for you.

Read more

5 simple steps to securing your remote employees

Modern businesses require modern cybersecurity, and modern cybersecurity means more than just implementing the latest tech. It also means implementing good governance.

Read more

A week in security (August 26 – September 1)

A roundup of the latest cybersecurity news for the week of August 26-September 1 including xHelper Trojan, Nextdoor app, clickjacking problem, investing cybersecurity, and iPhone malware

Read more

A week in security (May 13 – 19)

A roundup of security news from May 13–19, including ransomware attacks on the upswing, website hacking, pseudo-VPNs, bloatware, and more.

Read more

A week in security (April 8 – 14)

A roundup of news stories from April 8–14, including Baldr, medical management apps, an Android password stealer, and new sextortion scams.

Read more

Apple pulls Facebook enterprise certificate

After an app using an internal-only certificate from Facebook made its way into the outside world, Apple has responded by pulling Facebook’s developer certificate with immediate consequences for the social media giant.

Read more

How to create a sticky cybersecurity training program

Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you’re an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.

Read more

Select your language