Progressive phishing: How PWAs can be used to steal passwords
A new phishing technique uses progressive web apps (PWAs) to mimic browser windows with convincing web addresses to steal passwords.
104 articles
A new phishing technique uses progressive web apps (PWAs) to mimic browser windows with convincing web addresses to steal passwords.
How to use private browsing mode, what it doesn’t protect against, and why Google is deleting five billion dollars’ worth of user data.
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
Proxyware can make it difficult to detect cyberattacks on organizations — sometimes making the latter unwitting accomplices in crimes.
How to tell a real photo or video from a fake, and trace its provenance.
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
Cybersecurity trends to consider and new threats to protect against in 2024.
From the alarming rise of AI-powered cyberthreats to the often-overlooked human factor, discover how the interplay of technology and human behaviour shapes the future of cyber-defence in India.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
A look at the pros and cons of updating Android — and ways to do it safely.
From watching foreign sports to finding the best online sales, we share the top high-speed VPN lifehacks.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
Dive into the depths of AI’s promised game-changing effects and also its perils, emerging AI threats, and our CEO’s vision for cyber immunity at our APAC Cybersecurity Weekend 2023.
What settings do you need to clear before getting rid of a gadget?
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.