Canada's government services hit by cyberattacks – Vishing attacks surge amid COVID-19 pandemic – DDoS extortionists strike again
The extortionists attempt to scare the targets into paying by claiming to represent some of the world’s most notorious APT groups
Chrome gets a new way of managing tabs while Firefox now features a new add-ons blocklist
Cybercriminals take aim at teleworkers, setting up malicious duplicates of companies' internal VPN login pages
Several services, including the national revenue agency, had to be shut down following a series of credential-stuffing attacks
From keeping your account safe to curating who can view your liked content, we look at how you can increase your security and privacy on TikTok
Grandoreiro takes aim at Spanish taxpayers – Dangers posed by cloned social media accounts – How to prepare your digital estate plan
Beware the tax bogeyman – there are tax scams aplenty
It's never too soon to plan for what will happen to your digital presence after you pass away
Armed with personal data stolen from the hotel's dining reservation system, fraudsters trick guests into handing over their credit card details
Could your social media account be spoofed, why would anybody do it, and what can you do to avoid having a doppelgänger?
A deep dive into Mekotio – The financial fallout from data breaches – Fixing election security issues
The web browser will only display domain names as a way to help people recognize impostor websites
Another in our occasional series demystifying Latin American banking trojans
The price tag is higher if the incident exposed customer data or was the result of a malicious attack, an annual IBM study finds
An apparent glitch is preventing a number of users from signing in to their accounts
With the big voting day rapidly approaching, can the security of the election still be shored up? If so, how?
ESET highlights new research at Black Hat 2020 – What to if your data was stolen in the Blackbaud breach
We introduce Stadeo – a set of scripts that can help fellow threat researchers and reverse engineers to deobfuscate the code of Stantinko and other malware
Why are SMBs a target for ransomware-wielding gangs and what can they do to protect themselves against cyber-extortion?