Buffer overflow vulnerabilities and attacks can sometimes be difficult to avoid. Here’s is what you need to know, and what you can do to secure your applications.
Plans for a digital ID that proves COVID-19 immunity raises a number of ethical and privacy concerns. We highlight these concerns and offer recommendations.
Pretexting is at the center of virtually every successful social engineering attack. Here’s is what you need to know, and what you can do to defend yourself.
Is Google Drive secure? Find out all you need to know about Google Drive security, and how to improve it.
You may have already been hacked but just don’t know it yet. Here’s how to tell if you have been hacked.
Health officials in Argentina exposed a database containing personal information from people who applied for COVID-19 circulation permits, which exempt recipients from quarantine restrictions.
Need to delete your Twitter account fast? We reveal exactly how to remove your account and ensure all of your information is permanently deleted.
Advanced persistent threats (APTs) are the most complex cyberattacks. They are generally mounted by groups linked to nation-states, and target highly valuable systems and data.
We put a MongoDB honeypot on the web for three months to see who would attempt to view, steal, and destroy exposed data.