Plans for a digital ID that proves COVID-19 immunity raises a number of ethical and privacy concerns. We highlight these concerns and offer recommendations.
Pretexting is at the center of virtually every successful social engineering attack. Here’s is what you need to know, and what you can do to defend yourself.
Is Google Drive secure? Find out all you need to know about Google Drive security, and how to improve it.
You may have already been hacked but just don’t know it yet. Here’s how to tell if you have been hacked.
En Argentina, Sanidad ha hecho pública en su página web la base de datos que contiene información personal de quienes solicitaron permisos de circulación durante la COVID-19 para estar exentos de las restricciones de la cuarentena. La base de datos, con información de más de 115 000 argentinos que solicitaron permisos de circulación, se subió […]
Need to delete your Twitter account fast? We reveal exactly how to remove your account and ensure all of your information is permanently deleted.
Advanced persistent threats (APTs) are the most complex cyberattacks. They are generally mounted by groups linked to nation-states, and target highly valuable systems and data.
We put a MongoDB honeypot on the web for three months to see who would attempt to view, steal, and destroy exposed data.
Many of us have gotten used to the online scams we see in our inboxes every day, but who is more likely to be targeted by scammers? We reveal the most common online harassment tactics and how to avoid them.
The domain name system is complex, which leaves it open to a range of DNS attacks. Find out what they are and how to defend against them.