161 articles
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
Which screen-locking method best protects your Android smartphone: PIN code, password, pattern lock, fingerprint, or face recognition?
Proper account security not only reduces the number of cyberattacks on companies — it brings financial benefits too. What needs to be done to reap them?
Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
We explain how attackers can steal your credentials and how you can prevent it.
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
And more importantly — how to stop your passwords from being used by cybercriminals.
Why you shouldn’t trust a random period-tracking app, and what to look out for when choosing one.
Which corporate assets should be first in line for protection against cyberattacks?
How an intern can be a threat to your organization’s cybersecurity and what you can do about it.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.