“Hi, this is tech support”
Fake tech-support has long been a trend in fraud worldwide. We explain how it works, and what you can do to protect yourself.
8 articles
Fake tech-support has long been a trend in fraud worldwide. We explain how it works, and what you can do to protect yourself.
Some network-attached storage from WD has been reset to factory settings, wiping users’ data. Here’s how to protect your WD NAS.
Hell hath no fury. A former medical device supplier sabotages deliveries to customers.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
Our ICS CERT experts found 37 vulnerabilities in four VNC implementations. The developers have fixed most, but not all, of them.
Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.
Do your employees install and set up business software for themselves? Are you sure no outsiders are getting access to your network that way?
When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough