Latest Articles

Attackers could use heat traces left on keyboard to steal passwords

Attackers could use heat traces left on keyboard to steal passwords

Attackers could use heat traces left on keyboard to steal passwords

The attack, called "Thermanator", could use your body heat against you in order to steal your credentials or any other short string of text that you have typed on a computer keyboard

Tomáš Foltýn06 Jul 2018


Secure Coding

Five tips for pentesters in iOS

Five tips for pentesters in iOS

Secure Coding

Five tips for pentesters in iOS

Recommendations for pentesters looking for security flaws in iOS applications made by developers

Denise Giusto Bilić05 Jul 2018


Digital Security

Going on vacation? Five things to do before you leave

Going on vacation? Five things to do before you leave

Digital Security

Going on vacation? Five things to do before you leave

You’ve set up an out-of-office auto-responder and packed your stuff, but have you done all of your “homework” before you rush out the front door for that well-deserved time off?

Tomáš Foltýn04 Jul 2018


Britain’s tax authority reports takedown of record 20,000 fake sites

Britain’s tax authority reports takedown of record 20,000 fake sites

Britain’s tax authority reports takedown of record 20,000 fake sites

Her Majesty's Revenue & Customs (HMRC) is “consistently the most abused government brand”, according to the National Cyber Security Centre (NCSC)

Tomáš Foltýn03 Jul 2018


Digital Security

The principle of least privilege: A strategy of limiting access to what is essential

The principle of least privilege: A strategy of limiting access to what is essential

Digital Security

The principle of least privilege: A strategy of limiting access to what is essential

The principle of least privilege is a security strategy applicable to different areas, which is based on the idea of only granting those permissions that are necessary for the performance of a certain activity

Miguel Ángel Mendoza02 Jul 2018


Social Media

How (over)sharing on social media can trip you up

How (over)sharing on social media can trip you up

Social Media

How (over)sharing on social media can trip you up

Profuse recounting of details from your life via social media may come at a price

Tomáš Foltýn29 Jun 2018


Social Media

Twitter bots, disassemble

Twitter bots, disassemble

Social Media

Twitter bots, disassemble

Social media giants announce new measures to tackle bots and abusers

Shane Curtis28 Jun 2018


World Cup squads briefed on cybersecurity best practices

World Cup squads briefed on cybersecurity best practices

World Cup squads briefed on cybersecurity best practices

The football associations of countries competing at Russia 2018 are taking no chances when it comes to cyber-related issues

Shane Curtis27 Jun 2018


Wi-Fi security gets a boost as WPA3 standard is launched

Wi-Fi security gets a boost as WPA3 standard is launched

Wi-Fi security gets a boost as WPA3 standard is launched

The new wireless security protocol is poised to make hacking Wi-Fi connections a whole lot harder

Tomáš Foltýn26 Jun 2018


Microsoft Edge bug could be exploited to spill your emails to malicious sites

Microsoft Edge bug could be exploited to spill your emails to malicious sites

Microsoft Edge bug could be exploited to spill your emails to malicious sites

Since a patch for the flaw has already been released, users are well advised to make sure that they’re running the browser’s most recent version

Tomáš Foltýn22 Jun 2018


South Korea's largest cryptocurrency exchange hacked

South Korea's largest cryptocurrency exchange hacked

South Korea's largest cryptocurrency exchange hacked

Bithumb has claimed that $31.5 million worth of virtual coins were stolen by hackers

Shane Curtis21 Jun 2018


11 'teammates' to help you win your own cybersecurity game

11 'teammates' to help you win your own cybersecurity game

11 'teammates' to help you win your own cybersecurity game

Our lineup may seem heavy on the defensive side, but such is the nature of game plans for warding off a range of threats lurking in cyberspace

Tomáš Foltýn20 Jun 2018


Threat Report
MSP Program