Tinder, Bumble or Grindr - popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.
LinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a step-by-step guide on how to enjoy LinkedIn safely.
The lead-up to the Canada Day festivities has brought a tax scam with it
If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs
In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers
I’ve created an NFT so you don’t have to – here's the good, the bad and the intangible of the hot-ticket tokens
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask
Here’s what to watch out for when buying or selling stuff on the online marketplace and how to tell if you’re being scammed
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money
It pays to be careful – here’s how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash
Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe
Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices
It’s all fun and games until you get hacked – and this is just one risk of downloading cracked games
Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.
Scammers don't take the summer off – be on your guard when buying your Crit'Air sticker
Don't worry, elections are safe. Our Security Researcher Cameron Camp provide us highlights from the DEF CON 30 conference.
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.
Cybercriminals exploited a vulnerability to steal the equivalent of 18M$ from the NFT music streaming platform Audius, while other cyberthreats related to crypto makes the news.