Digital security


764 articles

How scammers are exploiting DeepSeek's rise

How scammers are exploiting DeepSeek's rise

How scammers are exploiting DeepSeek's rise

As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing – plus, what else to know before using DeepSeek

Editor31 Jan 2025


Cybersecurity and AI: What does 2025 have in store?

Cybersecurity and AI: What does 2025 have in store?

Cybersecurity and AI: What does 2025 have in store?

In the hands of malicious actors, AI tools can enhance the scale and severity of all manner of scams, disinformation campaigns and other threats

Phil Muncaster15 Jan 2025


Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

As detections of cryptostealers surge across Windows, Android and macOS, it's time for a refresher on how to keep your bitcoin or other crypto safe

Phil Muncaster09 Jan 2025


AI moves to your PC with its own special hardware

AI moves to your PC with its own special hardware

AI moves to your PC with its own special hardware

Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU.

Cameron Camp06 Jan 2025


Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems

Tony Anscombe13 Dec 2024


Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?

Tony Anscombe12 Dec 2024


My information was stolen. Now what?

My information was stolen. Now what?

My information was stolen. Now what?

The slow and painful recovery process

Aryeh Goretsky19 Nov 2024


Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry

Imogen Byers14 Oct 2024


Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices

Tony Anscombe01 Oct 2024