Pretexting is at the center of virtually every successful social engineering attack. Here’s is what you need to know, and what you can do to defend yourself.
Is Google Drive secure? Find out all you need to know about Google Drive security, and how to improve it.
You may have already been hacked but just don’t know it yet. Here’s how to tell if you have been hacked.
Health officials in Argentina exposed a database containing personal information from people who applied for COVID-19 circulation permits, which exempt recipients from quarantine restrictions.
Need to delete your Twitter account fast? We reveal exactly how to remove your account and ensure all of your information is permanently deleted.
Advanced persistent threats (APTs) are the most complex cyberattacks. They are generally mounted by groups linked to nation-states, and target highly valuable systems and data.
We put a MongoDB honeypot on the web for three months to see who would attempt to view, steal, and destroy exposed data.
Many of us have gotten used to the online scams we see in our inboxes every day, but who is more likely to be targeted by scammers? We reveal the most common online harassment tactics and how to avoid them.
The domain name system is complex, which leaves it open to a range of DNS attacks. Find out what they are and how to defend against them.
If you think leaving user data exposed online for “just a day” is no big deal, think again.