CVE-2017-11882: five years of exploitation
It means that some companies still have not installed MS Office patches that were published 5 years ago.
898 articles
It means that some companies still have not installed MS Office patches that were published 5 years ago.
Four threats you might face when using Airbnb, and tips for avoiding them.
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
What two-factor authentication types are out there, and which ones should be preferred.
A few tips on how to establish cybersecurity communications with employees.
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.
How scammers can hack your YouTube channel without knowing a password and second factor.
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
What multi-factor authentication is, why you should use it, and what “factors” there are.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Сloud technologies differ in terms of both costs and risks. What cloud type should you choose, and how should you begin your migration?
Website names in the ZIP and MOV domains are indistinguishable from file names. How will this affect IT systems, and what will threat actors do?
Cybercriminals are increasingly using deepfakes in attacks against companies. What can we do to be safer?