Cross-site request forgeries are complex attacks that exploit predictable request parameters. They lead to state changes that can cause significant harm to victims.
Ransomware as a Service is helping to fuel the surge in ransomware across the globe. Find out more about this type of criminal activity.
Today, we explore the history of WannaCry and explain how to prevent it from infecting your system with one easy step.
Remote code execution attacks can have disastrous consequences. In this post we look at what remote code execution attacks are, how they work, and what you can do about them.
Session hijacking is one of may online attacks we need to worry about today. In this post we look at how session hijacking works and what you can do to defend against it.
Comparitech researchers accessed and unsecured Facebook bot farm used to control nearly 14,000 fake accounts. Here’s what they found.
Travelers whose data was exposed could be at risk of identity theft, phishing, and other attacks. In some cases, national ID numbers and Social Security numbers were leaked.
If you receive a message from someone who claims to own images on your site and threatens legal action, it might well be a phishing scam.
Our study found that most organizations don’t acknowledge alerts regarding data breaches. Learn more about how this impacts end users.
Curious about what diagnostic data your PC is storing? We explain what info Windows 10 collects and how to change your log settings in under a minute.