5 reasons not to use work mail for personal matters
Why using a corporate mail account for personal matters is not a good idea
683 articles
Why using a corporate mail account for personal matters is not a good idea
Received a confirmation e-mail for a purchase you didn’t make with a phone number to contact the company? Beware, it’s vishing.
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
In computer games, where does the money go — and what can you do about it?
Scammers pretend to represent brands on Twitter and lure customers onto phishing websites. Here’s how to avoid it.
Spammers are using malicious macros to distribute IcedID and Qbot banking malware in seemingly important documents.
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
How ontologies can provide the world with greater, faster protection from cyberthreats and more.
How to protect your clients from cybercriminals impersonating your company on Twitter.
Many companies throw out information that can pose a security or reputational risk.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
Scammers continue to target cryptoinvestors, this time by luring their victims with fake ICOs for “hype” coins.
If your phone falls into the hands of criminals, do not panic. Here is how to protect your data.
No one is immune to smartphone theft, but you can make sure no thief will get even a byte of your important data.
At RSA Conference 2021, representatives of international financial institutions spoke about the fight against money mules and launderers.
ArtStation job scam targets freelance artists.
In the face of high-profile ransomware attacks on healthcare institutions, here’s how to protect your business from the threat.
The most active groups targeting companies, encrypting data, and demanding ransom.
How fake sellers are stealing bitcoins from buyers of sought-after mining equipment.