Latest Articles

Digital Security

What is an attack surface and how can you reduce it?

What is an attack surface and how can you reduce it?

Digital Security

What is an attack surface and how can you reduce it?

Discover the best ways to mitigate your organization's attack surface, in order to maximize cybersecurity.

Phil Muncaster14 Sep 2021


Scams

Beware of these 5 common scams you can encounter on Instagram

Beware of these 5 common scams you can encounter on Instagram

Scams

Beware of these 5 common scams you can encounter on Instagram

From cybercriminal evergreens like phishing to the verification badge scam, we look at the most common tactics fraudsters use to trick their victims

Amer Owaida13 Sep 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Cyberespionnage against Kurdish ethnic group, and more! – Week in security with Tony Anscombe

Editor10 Sep 2021


Cybercrime

Victims duped out of US$1.8 million by BEC and romance scam ring

Victims duped out of US$1.8 million by BEC and romance scam ring

Cybercrime

Victims duped out of US$1.8 million by BEC and romance scam ring

Elderly men and women were the main targets of the romance scams operated by the fraudsters.

Amer Owaida10 Sep 2021


Digital Security

Howard University suffers cyberattack, suspends online classes in aftermath

Howard University suffers cyberattack, suspends online classes in aftermath

Digital Security

Howard University suffers cyberattack, suspends online classes in aftermath

The university suffered a ransomware attack; however, there is no evidence so far of data being accessed or stolen.

Amer Owaida09 Sep 2021


Privacy

ProtonMail forced to log user’s IP address after order from Swiss authorities

ProtonMail forced to log user’s IP address after order from Swiss authorities

Privacy

ProtonMail forced to log user’s IP address after order from Swiss authorities

Following the incident the company has updated its website and privacy policy to clarify its legal obligations to users

Amer Owaida07 Sep 2021


ESET Research

BladeHawk group: Android espionage against Kurdish ethnic group

BladeHawk group: Android espionage against Kurdish ethnic group

ESET Research

BladeHawk group: Android espionage against Kurdish ethnic group

ESET researchers have investigated a mobile espionage campaign that targets the Kurdish ethnic group and has been active since at least March 2020

Lukas Stefanko07 Sep 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Vaccination passports - what you need to know. A guide to kids' smartphone security. CISA lists single-factor authentication as bad practice.

Editor03 Sep 2021


Kids Online

A parent’s guide to smartphone security

A parent’s guide to smartphone security

Kids Online

A parent’s guide to smartphone security

Smartphones are kids’ trusty companions both in- and outside the classroom, and as they return to their desks, we’ve prepared some handy tips on how to keep their devices secure.

Amer Owaida03 Sep 2021


Social Media

Twitter introduces new feature to automatically block abusive behavior

Twitter introduces new feature to automatically block abusive behavior

Social Media

Twitter introduces new feature to automatically block abusive behavior

Dubbed Safety Mode, the feature will temporarily block authors of offensive tweets from being able to contact or follow users.

Amer Owaida02 Sep 2021


COVID-19, ESET Research

Flaw in the Quebec vaccine passport: analysis

Flaw in the Quebec vaccine passport: analysis

COVID-19, ESET Research

Flaw in the Quebec vaccine passport: analysis

ESET cybersecurity expert Marc-Étienne Léveillé analyses in-depth the Quebec vaccine proof apps VaxiCode and VaxiCode Verif.

Marc-Etienne M.Léveillé31 Aug 2021


Digital Security

Don’t use single-factor authentication, warns CISA

Don’t use single-factor authentication, warns CISA

Digital Security

Don’t use single-factor authentication, warns CISA

The federal agency urges organizations to ditch the bad practice and instead use multi-factor authentication methods

Amer Owaida31 Aug 2021


Threat Report
MSP Program