
231 articles
Fake airline giveaways won’t win you a ticket, but they might steal your data.
Avoid the phishing bait and protect your Telegram account
If someone offers cryptocurrency for nothing, remember the only free cheese is in a mousetrap. Here’s what’s really going on.
People put a lot of time, effort, and money into the online games they love. And yet many of them don’t bother to protect their gaming accounts properly.
Many people assume that an HTTPS connection means that the site is secure. In fact, HTTPS is increasingly being used by malicious sites, especially phishing ones.
Facebook has been crawling with reposts that claim to be giving away thousands of free airline tickets. We uncover the truth.
It turns out there are bots in Tinder and OkCupid. Who wants that?
A phishing scam to try and get you to hand over your battle.net account details is offering a free pet. There’s no free pet.
Many people now do their taxes online, and cybercriminals see that as a huge opportunity to make money with phishing schemes.
As our research shows, the actual costs of a cybersecurity incident to a financial institution in UK can add up to as much as $737,000.
Cybercriminals consider Black Friday and Cyber Monday a great time to steal your money. Here are a few tips on how to stay safe and still have fun.
So you just paid for tickets to the Olympics, and now you’re planning your trip to Rio de Janeiro? Check that ticket twice: you may have been scammed.
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
A pirate app store that has tricked Apple and passed its code review is now stealing user’s creden-tials using FairPlay Man-in-the Middle attack.
What happens when real cyber experts head to TV to stop cybercrime?
Does your use of social media make you a liability to your company?
A look at the evolution of mobile threats in 2015 and some predictions for 2016