
Security of Electron-based desktop applications
A few words on why desktop applications based on the Electron framework should be approached with caution.
455 articles
A few words on why desktop applications based on the Electron framework should be approached with caution.
Why the Windows system time can suddenly change, and how to stop it from happening.
Why criminals want to hack your website, how they might use it in new attacks, and how to stop them.
Some thoughts on what PC software patches should be prioritized and why.
Gadgets to help protect employees’ devices against hackers and other threats.
What caused a mass vulnerability in VPN clients, and how to keep them working.
It means that some companies still have not installed MS Office patches that were published 5 years ago.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
July Microsoft Patch Tuesday: a collection of exploited vulnerabilities.
SMBs and corporations are increasingly outsourcing certain IT responsibilities, though it is not usually a one-size-fits-all solution.
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Researchers have come up with a way to exfiltrate confidential data by observing LED activity.
How scammers can hack your YouTube channel without knowing a password and second factor.
Website names in the ZIP and MOV domains are indistinguishable from file names. How will this affect IT systems, and what will threat actors do?
Crypto mixers, nested exchanges, cash-out and other crypto-laundering methods used by ransomware operators.
Why you should purge your company’s LinkedIn page from fake employee profiles, and how to do it.
The pros and cons of different approaches to deploying and maintaining information security systems.
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.