Wondering about cyber crime rates in the US? Find out the most recent US cyber security statistics and trends from recent reports.
In this article, we discuss the underlying processes of the MD5 algorithm and how the math behind the MD5 hash function works.
MD5 is a cryptographic hash function that is no longer considered safe for many purposes. Find out why and what to use instead.
What are number spoofing scams and how do they work? Here’s everything you need to know, including how to stop number spoof scams.
Personal details of 35 million residents in and around Chicago, Los Angeles, and San Diego were exposed online. The database owner is still unknown.
In recent years, phishing attacks have fast become the favored method for criminals to steal data from unsuspecting victims. These attacks have risen by almost 815 percent in just two years, with as many as 74 percent of US organizations experiencing a successful phishing attack in 2020. Last year, cybercriminals were quick to put the […]
We tested the top 12 best-selling home wi-fi routers on Amazon. Our results show attackers can find and remotely access about one in 16 internet-connected home wi-fi routers using the manufacturer’s default admin password. Victims could be at risk of eavesdropping, malware, hijacking, and more.
In 2020, our phones became an even more valuable lifeline to the outside world. But instead of picking up the phone to hear the familiar voices of our friends and families, many of us were greeted with automated robot voices, exclaiming, “Good afternoon, your warranty is up for renewal!” or “Congratulations, you have won a […]
Comparitech security researchers discovered an unprotected database containing more than 5 billion records aggregated from previous data breaches.
A software vendor for British Gas, the UK’s biggest energy supplier, exposed 3.6 million customer email addresses on the web without a password. Customers might be at risk of phishing.