
Privacy in reproductive health apps
Why you shouldn’t trust a random period-tracking app, and what to look out for when choosing one.
177 articles
Why you shouldn’t trust a random period-tracking app, and what to look out for when choosing one.
Which corporate assets should be first in line for protection against cyberattacks?
How an intern can be a threat to your organization’s cybersecurity and what you can do about it.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
We analyze some typical examples of phishing bait for movie streamers.
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
Npm package UAParser.js, installed on tens of millions of computers worldwide, has been infected with a password stealer and a miner. Here’s what to do.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Kaspersky Password Manager can do a lot more than just store your passwords.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
Use these Origin settings to protect your EA account from hijacking, data theft, and spam.
A complete guide to security and privacy settings for your Battle.net account.
We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.
Our expert David Jacoby goes live with Instagram influencer Ashley James, sharing life hacks for a secure digital life.
On this episode of the podcast, Dave and Jeff discuss sharing your password on a flipchart for everyone to see, Uber’s 2016 breach cover-up, ransomware hitting college, and more.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.