Tips & advice


3147 articles

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure

Editor26 Aug 2024


Why scammers want your phone number

Why scammers want your phone number

Why scammers want your phone number

Your phone number is more than just a way to contact you – scammers can use it to target you with malicious messages and even exploit it to gain access to your bank account or steal corporate data

Márk Szabó13 Aug 2024


The great location leak: Privacy risks in dating apps

The great location leak: Privacy risks in dating apps

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance?

Tony Anscombe12 Aug 2024


Top 6 Craigslist scams: Don’t fall for these tricks

Top 6 Craigslist scams: Don’t fall for these tricks

Top 6 Craigslist scams: Don’t fall for these tricks

Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun

Phil Muncaster12 Aug 2024


Beware of fake AI tools masking very real malware threats

Beware of fake AI tools masking very real malware threats

Beware of fake AI tools masking very real malware threats

Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI assistants

Phil Muncaster29 Jul 2024


Building cyber-resilience: Lessons learned from the CrowdStrike incident

Building cyber-resilience: Lessons learned from the CrowdStrike incident

Building cyber-resilience: Lessons learned from the CrowdStrike incident

Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances

Tony Anscombe23 Jul 2024


Beyond the blue screen of death: Why software updates matter

Beyond the blue screen of death: Why software updates matter

Beyond the blue screen of death: Why software updates matter

The widespread IT outages triggered by a faulty CrowdStrike update have put software updates in the spotlight. Here’s why you shouldn’t dread them.

Tomáš Foltýn19 Jul 2024


The complexities of cybersecurity update processes

The complexities of cybersecurity update processes

The complexities of cybersecurity update processes

If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike

Tony Anscombe19 Jul 2024


Small but mighty: Top 5 pocket-sized gadgets to boost your ethical hacking skills

Small but mighty: Top 5 pocket-sized gadgets to boost your ethical hacking skills

Small but mighty: Top 5 pocket-sized gadgets to boost your ethical hacking skills

These five formidable bits of kit that can assist cyber-defenders in spotting chinks in corporate armors and help hobbyist hackers deepen their understanding of cybersecurity

Tomáš Foltýn16 Jul 2024