
Life-hack of the day: emoji passwords
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.
Economics. Eschatology. Infosec.
108 articles
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
You’re spending way more on subscriptions than you expect. How to take control of them and save money?
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
Detailed tips for those who want to make money from streaming without feeding the trolls.
What caused a mass vulnerability in VPN clients, and how to keep them working.
What settings do you need to clear before getting rid of a gadget?
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
How to secure chats on your phone, and why encryption alone is not enough
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.