A voice phishing (vishing) scam that targets employees working from home is making the rounds. Learn how this scam works and what your company can do […]
Apple iPhones have a built-in text-replacement feature. Although it’s not new or flashy, it can be quite useful. Discover what this feature does and how to […]
By far, the two most popular smartphone platforms available on the market today are Apple’s iOS and Google’s Android operating systems. iOS, of course, only works […]
As more schools and businesses find themselves going online, Remote Desktop Protocol (RDP) users are more vulnerable than ever to a ransomware attack. Learn more about […]
Many contact-tracing apps have popped up since the Coronavirus Disease 2019 (COVID-19) pandemic began. Discover how their technologies influence how they operate.
Accidentally transposing two letters is all it might take to become a typosquatting victim. Find out what typosquatting is and how to avoid becoming a victim.
After receiving reports that cybercriminals were increasingly using Firefox Send to distribute malware, Mozilla took this file-sharing service offline. Find out why the service was commonly […]
Researchers recently discovered a dozen malware-laden apps in the Google Play store. Learn about these apps and how to protect your mobile device from them.
Network infrastructures are getting more complex and thus harder to secure with traditional network security tools. Fortunately, there’s a viable alternative: the zero trust model. Here […]