Mobile payment apps: How to stay safe when paying with your phone
Are mobile payments and digital wallets safe? Are the apps safer than credit cards? What are the main risks? Here’s what to know.
Are mobile payments and digital wallets safe? Are the apps safer than credit cards? What are the main risks? Here’s what to know.
The operation was carried out against fraudsters trying to monetize stolen credit card data on the internet’s seedy underbelly
The U.S. law enforcement agency shares a sampling of more than 90 spoofed FBI-related domains registered recently
Here’s what to know about attacks where a fraudster has your number, literally and otherwise
This won't be music to your ears – researchers spot an unsecured database replete with records used for an account hijacking spree
The peace of mind that comes with connected home security gear may be false – your smart doorbell may make an inviting target for unwanted visitors
From the impact of the pandemic on cybersecurity careers to workers’ job satisfaction, the report offers a number of interesting findings
They’re supremely easy to remember, as well as easy to crack. Here’s how to improve your password security.
The information at risk of theft due to API flaws included people’s pictures, locations, dating preferences and Facebook data
ESET researchers uncover a novel Lazarus supply-chain attack leveraging WIZVERA VeraPort software
Looking for vulnerabilities, securing systems or dismantling them, these are all viable career paths in the cybersecurity industry. Could one of them be right for you?
The last three weeks have seen a bumper crop of patches for zero-day bugs across software from Google, Apple and Microsoft
Backdoor authors show deep knowledge of the targeted POS software, decrypting database passwords from Windows registry values
The second Tuesday of the month brings another fresh batch of fixes for security vulnerabilities in various Microsoft products
Sharing is caring – except when it isn’t. Here’s why you shouldn’t share your password for online media services with other people.
The cache of data sitting wide open on a server included full names, national ID numbers and credit card data
The vulnerabilities, which are all being abused for targeted attacks, affect a long list of devices
The developer of popular video game franchises took swift action to prevent the attack from spreading further across its systems
The updates come on the heels of news of attacks exploiting another zero-day in Chrome in tandem with a previously-unknown Windows flaw
There’s no shortage of opportunities for cybersecurity professionals and people looking to break into this field of endeavor. Could this also be the right career path for you?