From competitive salaries to ever-evolving job descriptions, there are myriad reasons why a cybersecurity career could be right for you
The startup came under scrutiny after it emerged that it had amassed 3 billion photos from social media for its facial recognition software
With earnings of top ethical hackers surpassing hundreds of thousands of dollars, some would say yes
A number of celebrities, government officials and tech CEOs were also caught up in the incident
The dawn of the DNS over HTTPS era is putting business security and SOC teams to the challenge
The same hackers have also gotten their mitts on social media accounts of other high-profile sporting targets
If you’re looking to become a pro gamer, there are risks you shouldn’t play down
The league and scores of teams were caught off-guard by the re-emergence of an infamous hacking group
Databases containing 14 years’ worth of customer support logs were publicly accessible with no password protection
And it doesn’t require much more than downloading a dedicated app
An ESET-commissioned survey sheds light on the browsing habits of Australians and how they protect themselves online
Today, Microsoft is officially pulling the plug on its support for Windows 7. What’s your plan?
As software becomes more important than ever, how can engaging the security industry make the road ahead less winding?
No one has a road map for securing a connected city – but there should be a whole atlas of such maps
Footage defined as parody or satire will be permitted, as the social network isn’t slamming the door on all types of manipulated media
In the second blogpost of this two-part series we'll suggest handy tips to help enhance the security of your mobile devices
In the first instalment of this two-article series we will be looking at cybersecurity habits to avoid when using your computing devices
Disposing of old tech isn’t a one-click solution; there are multiple things you have to consider before moving on to greener pastures
What are some of the key things you should do with your shiny new device as soon as you unbox it?
The second authentication factor might be a minor inconvenience, but it provides a major security boost