Learn how to protect yourself online with our guide to brute force attacks. Understand the types, tools, and defense strategies for this prevalent cyber threat.
Credential stuffing is a cybercrime where bad actors try to use one of your logins on multiple accounts. Learn how to protect yourself from password stuffing
A new kind of scam that uses multiple actors to steal money is making the rounds. Educate yourself and your loved ones so you never fall for a Phantom Scam.
An attack surface refers to all of the potential security risks that leave you open to cyberattacks. Learn about your attack surface and how to reduce it.
Simply put, hacktivism is hacking and activism combined. Follow this guide to learn more about hacktivism, common motivations, and famous examples in the news.
Technology has simplified some pet owner responsibilities and can help us keep a closer eye on our furry friends, but could your favorite pet tech gadgets be putting you at risk of cyberthreats?
To remove a hacker from your phone, you should review app permissions, remove unfamiliar apps, update the operating system, clear cache, or do a factory reset.
A script kiddie is an amateur hacker who relies on prewritten scripts. Read along to learn more about script kiddies, how they work, and how to stay safe.
Follow this helpful guide to help learn more about pass the hash attacks, how they work, real-life examples, and how you can help to mitigate an attack.
Hacking groups can be a major threat to your business and are widely active on the web today. Learn about the top 15 hacker groups to watch for in this guide.
Cryptojacking refers to the illegal use of stolen computing power to mine cryptocurrency. Read our article to learn how to detect and prevent this cybercrime.
SIM swap fraud occurs when scammers take advantage of a weakness in two-factor authentication and verification and use your phone number to access your accounts.
Follow this guide to learn how to tell if someone hacked your router. We also cover how to fix a hacked router and protection tips to help keep your network safe.
If someone asks you to let them into a restricted area, it could be a tailgating attack. Read along to learn more about tailgating attacks and how to stay safe.
If you use public Wi-Fi, you may be at risk of an evil twin attack. So how do these attacks work, and how can you spot and avoid them? Read along to find out.
What should you do if a scammer has your email address? Find out if scammers have hacked your email account and what they can do with your email address.
Bluesnarfing attacks can put your files and Bluetooth devices in jeopardy. Follow this guide to learn more about bluesnarfing and how you can help prevent an attack.
Hackers can be categorized by the type of metaphorical “hat” they wear. What is the difference between black hat, white hat, and gray hat hackers? Learn more.
Learn about GPS spoofing and how it poses risks to your online security. Discover its legitimate and illegal uses, dangers, and ways to protect yourself.
A session hijacking attack happens when an attacker takes over your internet session. A session hijacking attacker can then do anything you could do on the site. Here’s how to help protect against session hijacking.
A man-in-the-middle attack is like eavesdropping. When data is sent between a computer and a server, a cybercriminal can get in between and spy. A man-in-the-middle attack requires three players: the victim, the entity with which the victim is trying to communicate, and the “man in the middle” who’s intercepting the victim’s communications.
Hackers have figured out a way to hijack cell phones and steal the valuable information contained in them. Find out how criminals go after emails, photographs and payment apps to commit larger crimes like blackmail, fraud and theft. Learn how to keep your identity safe.
The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how...
Formjacking is when cybercriminals inject malicious JavaScript code to hack a website and take over the functionality of the site's form page to collect sensitive user information
Youve heard of malware, ransomware, botnets, and the like. What you dont hear about is the technology behind these threats. These threats all have to come from somewhere, theyre not just out there...
39 million americans own smart speakers, according to a report from NPR and Edison Research. Experts believe a cybercriminal might be able to send a sound or signal to control your device. The good news: researchers are working on a fix.
Published: August 07, 2018 ·4 min read
Want more?
Follow us for all the latest news, tips, and updates.
Want more?
Follow us for all the latest news, tips, and updates.