We explain why secret chats in Telegram are a must, and how to configure security and privacy.
Jeff and Dave chat about Parler’s resurgence, monkey thieves, and Bitcoin scams on Twitter that use verified accounts.
Almost half of women working in tech believe the effects of COVID-19 have delayed, rather than enhanced, their career prospects, survey finds.
Jeff and Dave discuss the cybersecurity fallout of the US Capitol attack, Parler, and more.
Hell hath no fury. A former medical device supplier sabotages deliveries to customers.
Researchers have created an extension to learn about the information websites collect to “fingerprint” browsers.
People are receiving phishing e-mail messages with requests for payments for a package delivery, with links to a fake postal service website for making the payment.
No one should be using the dead technology, and any websites that still use it need an update.
“Zyfwp,” an admin-level account with a hard-coded password, discovered in several networking devices made by ZyXel.
Jeff and Dave discuss the death of Adobe Flash, swatting through the Internet of Things, and more.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
Cybercriminals are disguising ransomware as a beta version of Cyberpunk 2077 for Android.
The world’s first show for gaming moms is on YouTube. Its purpose: breaking stereotypes about video games (and about parents).
Ahead of its release, scammers are offering free Cyberpunk 2077 downloads, but they’re really after your data.
More than 20 apps on Google Play that promised cool Minecraft mods turned out to be malicious.
Scammers have created hundreds of phishing pages with fake item giveaways, aiming to steal PUBG mobile account credentials.
Seven safety and security rules to keep in mind when buying games and in-game items.
Use these Origin settings to protect your EA account from hijacking, data theft, and spam.
Can you transmit wireless data over a wired network? Evidence shows it can be done.
Computers don’t necessarily need a Wi-Fi module to transmit information over Wi-Fi, Israeli researchers have found.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
Why backing up is good but not enough when it comes to staying safe from ransomware.
Our method for training models to filter out spam lets you maintain privacy without losing efficiency.
Protect your corporate computer from unauthorized physical access.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Two schemes whereby a victim receives money — and neither one is good news.
When it comes to information security, we’re seeing the same mistakes over and over again.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
We explain how to hide private data in images properly, without making rookie mistakes.
Many swear phones secretly listen in through their built-in microphones. We investigate the claims — and offer other explanations for spookily precise mobile ads.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
Ten tips to make your private digital life really private.
Kaspersky researchers found malware in CamScanner, a text recognition app that was downloaded more than 100 million times from Google Play.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
Tips to help buyers and sellers on eBay.
Decided to invest in cryptocurrency? Read our guide to avoid the most common rookie mistakes and not lose money.