Disposing of a gadget? Remember to wipe this
What settings do you need to clear before getting rid of a gadget?
161 articles
What settings do you need to clear before getting rid of a gadget?
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
Which screen-locking method best protects your Android smartphone: PIN code, password, pattern lock, fingerprint, or face recognition?
Proper account security not only reduces the number of cyberattacks on companies — it brings financial benefits too. What needs to be done to reap them?
Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
And more importantly — how to stop your passwords from being used by cybercriminals.
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
Why you shouldn’t trust a random period-tracking app, and what to look out for when choosing one.
Which corporate assets should be first in line for protection against cyberattacks?
We explain how attackers can steal your credentials and how you can prevent it.
How an intern can be a threat to your organization’s cybersecurity and what you can do about it.