What happens with a hacked Instagram account – and how to recover it
Had your Instagram account stolen? Don’t panic – here’s how to get your account back and how to avoid getting hacked (again)
Had your Instagram account stolen? Don’t panic – here’s how to get your account back and how to avoid getting hacked (again)
A major financial services company has learned the hard way about the importance of proper disposal of customers' personal data
The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits?
Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication?
Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device
The news seems awash this week with reports of both Microsoft and Apple scrambling to patch security flaws in their products
Cross-site tracking cookies have a bleak future but can still cause privacy woes to unwary users
ESET Research first spotted this variant of the SideWalk backdoor in the network of a Hong Kong university in February 2021
ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor
Has your Wi-Fi speed slowed down to a crawl? Here are some of the possible reasons along with a few quick fixes to speed things up.
Worok takes aim at various high-profile organizations that operate in multiple sectors and are located primarily in Asia
It pays to do some research before taking a leap into the world of internet-connected toys
Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol
Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files
What if your organization is hit by a cyberattack that is attributed to a nation state? Would your insurance cover the costs of the attack?
Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services.
Are you aware of the perils of the world’s no. 1 social media? Do you know how to avoid scams and stay safe on TikTok?
As another hospital falls victim to ransomware, Tony weighs in on the much-debated issue of banning ransomware payouts
Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you
You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps