How to spot you’re on a hacked website
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
1129 articles
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
Detailed tips for those who want to make money from streaming without feeding the trolls.
What settings do you need to clear before getting rid of a gadget?
Four threats you might face when using Airbnb, and tips for avoiding them.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
We explain how the advanced malware DoubleFinger downloads GreetingGhoul, a stealer that preys on cryptocurrency wallets.
Minecraft mods downloaded from several popular gaming websites contain dangerous malware. What we know so far.
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
In its February update, Microsoft buried Internet Explorer once and for all. Or did it? We investigate what really happened.
Why you should purge your company’s LinkedIn page from fake employee profiles, and how to do it.