Latest Articles

Social Media

A step-by-step guide to enjoying LinkedIn safely

A step-by-step guide to enjoying LinkedIn safely

Social Media

A step-by-step guide to enjoying LinkedIn safely

LinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a step-by-step guide on how to enjoy LinkedIn safely.

André Lameiras18 Aug 2022


Digital Security

DEF CON – “don’t worry, the elections are safe” edition

DEF CON – “don’t worry, the elections are safe” edition

Digital Security

DEF CON – “don’t worry, the elections are safe” edition

Don't worry, elections are safe – this is just one highlight from the DEF CON 30 conference.

Cameron Camp16 Aug 2022


Digital Security

How a spoofed email passed the SPF check and landed in my inbox

How a spoofed email passed the SPF check and landed in my inbox

Digital Security

How a spoofed email passed the SPF check and landed in my inbox

The Sender Policy Framework can’t help prevent spam and phishing if you allow billions of IP addresses to send as your domain

Rene Holt16 Aug 2022


Digital Security

Black Hat USA 2022: Burnout, a significant issue

Black Hat USA 2022: Burnout, a significant issue

Digital Security

Black Hat USA 2022: Burnout, a significant issue

The digital skills gap, especially in cybersecurity, is not a new phenomenon, with the problem now further exacerbated by the prevalence of burnout

Tony Anscombe15 Aug 2022


Digital Security

Black Hat – Windows isn’t the only mass casualty platform anymore

Black Hat – Windows isn’t the only mass casualty platform anymore

Digital Security

Black Hat – Windows isn’t the only mass casualty platform anymore

Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars

Cameron Camp15 Aug 2022


Video

The potential consequences of a data breach – Week in security with Tony Anscombe

The potential consequences of a data breach – Week in security with Tony Anscombe

Video

The potential consequences of a data breach – Week in security with Tony Anscombe

The NHS falls victim to an apparent cyberattack, which raises the question of the impact that data breaches have on people's personal data

Editor12 Aug 2022


Digital Security

Black Hat 2022 – Cyberdefense in a global threats era

Black Hat 2022 – Cyberdefense in a global threats era

Digital Security

Black Hat 2022 – Cyberdefense in a global threats era

Our Security evangelist's take on this first day of Black Hat 2022, where cyberdefense was on every mind.

Tony Anscombe12 Aug 2022


Digital Security

Safety first: how to tweak the settings on your dating apps

Safety first: how to tweak the settings on your dating apps

Digital Security

Safety first: how to tweak the settings on your dating apps

Tinder, Bumble or Grindr - popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.

André Lameiras12 Aug 2022


Digital Security

An eighties classic - Zero Trust

An eighties classic - Zero Trust

Digital Security

An eighties classic - Zero Trust

A deep-dive into zero trust to help you navigate the threat landscape in a zero-trust world and further secure your organization

Tony Anscombe11 Aug 2022


How To

How to check if your PC has been hacked – and what to do next

How to check if your PC has been hacked – and what to do next

How To

How to check if your PC has been hacked – and what to do next

Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.

Phil Muncaster09 Aug 2022


Video

Build a zero-trust environment to protect your organization - Week in security with Tony Anscombe

Build a zero-trust environment to protect your organization - Week in security with Tony Anscombe

Video

Build a zero-trust environment to protect your organization - Week in security with Tony Anscombe

Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization.

Editor05 Aug 2022


Scams

Don't get singed by scammers while you're carrying the torch for Tinder

Don't get singed by scammers while you're carrying the torch for Tinder

Scams

Don't get singed by scammers while you're carrying the torch for Tinder

Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.

André Lameiras04 Aug 2022