
A good reason to update Confluence
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
407 articles
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Examples of how QR codes in emails are used for phishing.
We take an in-depth look at securing and configuring containerization systems.
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
Dive into the depths of AI’s promised game-changing effects and also its perils, emerging AI threats, and our CEO’s vision for cyber immunity at our APAC Cybersecurity Weekend 2023.
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
What caused a mass vulnerability in VPN clients, and how to keep them working.
How cybercriminals force victims to work for them with offers of easy money.
Four threats you might face when using Airbnb, and tips for avoiding them.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Beware! Scammers are targeting your WhatsApp. Here’s how to spot and avoid fake WhatsApp calls.
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.