A zero-day vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to fix the flaw. If left unaddressed, vulnerabilities create security holes that cybercriminals can exploit. To keep your computer and data safe, it’s smart to take proactive and reactive security measures.
A hacker is an individual who uses their computer skills to find vulnerabilities in existing technology to achieve a goal or overcome an obstacle. In some cases, hackers may use their expertise maliciously and gain unauthorized access to private data.
An evil twin attack is when a hacker creates a Wi-Fi hotspot that impersonates a legitimate Wi-Fi network and then uses it to spy on your internet activity and steal your information, such as login credentials.
Also known as “executive phishing,” whaling attacks are something high-level executives and digital citizens alike should be aware of. Consider this your go-to guide about what is whaling, plus whaling protection tips.
Cybercrimes cost the world $6 trillion a year by 2021, according to cybersecurity ventures. Large data breaches and cyberthreats from foreign locales such as China and Russia threaten elections. Experts worry that 5G technology will create additional cybersecurity challenges for businesses.
A distributed denial-of-service attack is one of the most powerful weapons on the internet. A DDoS attack is a cyberattack on a server, service, website, or network that floods it with Internet traffic. The aim is to overwhelm the website or service with more traffic than the server or network can accommodate.
Hackers have figured out a way to hijack cell phones and steal the valuable information contained in them. Find out how criminals go after emails, photographs and payment apps to commit larger crimes like blackmail, fraud and theft. Learn how to keep your identity safe.
Data breaches, ransomware attacks, cryptojacking, threats to your connected devices all contribute to new rounds of cyber security facts, figures, and statistics. Do you find it hard to keep up? Let’s cherry-pick 10 cyber safety facts to help give you the big picture.
Equifax has announced that cybercriminals have exploited a vulnerability in their website, allowing them to gain access to certain files. The data breach appears to have taken place from mid-May through July 2017.
A vulnerability in Apple’s AirDrop feature has been discovered by Australian security researcher Mark Dowd. AirDrop is an “over-the-air” file sharing service that uses Bluetooth and WiFi, and is built into iOS and Mac OS X products.
Did you know that your ISP can see what you do while you’re online? From making purchases to looking up medical conditions, your actions create a digital trail of data that can paint a very detailed picture of you.
Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data.
Tax season is a ripe time for phishing and spreading malware; without fail, tax-related online scams remain a most popular type of phishing scam each and every year. Through our threat intelligence network, we have identified four types of tax scams that individuals and businesses should be wary of as they’re preparing to file their taxes in 2016.
Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second. This brings us to one the biggest challenges of Internet security – free vs paid internet security.
Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesnt rely on otherwise easy-to-spot phishing methods. Heres what you...
Smishing is a form of phishing that involves a text message or phone number. It's becoming an emerging and growing threat in the world of online security. Read on to find out what it is and how you can protect yourself against it.
Cybercriminals use sophisticated tactics to commit crimes. It takes a village to catch a cybercriminal since the method of how they commit these crimes is so complicated. Law enforcement usually has to coordinate with government agencies, international partners, and private corporations.
As more and more people lean towards reading in a digital format, here are a few things to keep in mind when reading ebooks. Never download pirated ebooks and always buy books and digital content from legitimate retailers. Some ebooks may contain malicious software that can install malware, spyware, and viruses in your computer.