Phishing using FB infrastructure stealing business-account passwords
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
66 articles
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Why you should purge your company’s LinkedIn page from fake employee profiles, and how to do it.
Cybercriminals are offering ban-as-a-service for blocking Instagram users.
How to protect your clients from cybercriminals impersonating your company on Twitter.
Nowadays, building a dossier on any Internet user is easier than you might think. Learn about doxers and their methods.
Facebook lets you manage the data it collects from third-party websites and apps. Here’s how.
A few stories about how easy it is to accidentally leak sensitive information into the public domain.
The abundance of work-related cloud tools and services calls for smart password handling.
Tools and approaches to help you get some online privacy.
We tell you which security and privacy settings will hold Twitter hackers and spammers at bay.
We reveal the best settings for protecting your profile from hackers, haters, and spammers.
How to protect your Instagram account and personal photos from prying eyes.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.