latest
Windows Hello Fingerprint Scanners Were Hacked: Should You Still Use Them?
Researchers managed to break through Windows Hello's fingerprint scans, but it's not as scary as you first think.
What Is a Cold Boot Attack and Can You Defend Against It?
When you flick the switch on your computer off, it takes the data stored in your RAM with it, right? Don't be so sure.
How Many Times Has LastPass Been Hacked, and Is It Still Safe to Use?
LastPass is a well-known and trusted name in password security, but its history of breaches might make you consider an alternative.
The 10 Biggest Crypto Hacks and Scams of 2023
2023 has been a tough year for crypto security, but which platforms suffered the most?
What Is Quishing? How Can You Prevent a Quishing Attack?
Quishing turns QR codes into dangerous attack vectors. Here's how to stay safe.
What Are OTP Bots?
OTP bots target one-time password systems to hack your accounts. Here's how to defend against them.
How to Protect Your Devices From a Fake USB O.MG Cable
A seemingly harmless USB cable can result in your devices being hacked.
What Is Key Stretching? Here's How Your Passwords Can Be Kept Secure
Key stretching can help you keep your online accounts safe. Here's how.
Why Does "Anonymous" Launch DDoS Cyber Attacks?
The "Anonymous" hacker group is known for its DDoS attacks, but why is this the case?
Can You Trust File Malware Scanners?
No one wants malicious code in their files. But can file malware scanners really be trusted to help with this issue?
What Is the “I Sent You an Email From Your Account” Blackmail Scam? How to Avoid It
Has someone claimed to be emailing you from your own account? It may be a scam.
Is Someone Mirroring Your Smartphone? Here's How to Check
Smartphone mirroring puts you and your sensitive data at risk, so it's important to be aware of the warning signs.
How Are Cryptographic Oracles Vulnerable to Padding Oracle Attacks?
Cryptographic oracles can be great tools for hackers. Here's why.
What Are Improper Error Handling Vulnerabilities?
Your app may be exposed to improper error handling vulnerabilities. Here's how.
What Is ZoomEye and How Is It Useful for Your Cybersecurity?
ZoomEye can prove useful for cybersecurity experts and enthusiasts, but also has its dangers.
What Is Wi-Fi Eavesdropping? Understanding the Risks and How to Stay Secure
Cybercriminals can listen in on your Wi-Fi activity by eavesdropping. Here's how it works and how you can avoid it.
What Is Data Exfiltration? How Can You Stop It Happening to You?
It doesn't matter if your system carries lots of data or a small amount of it: you need to protect it from many threats, including hacks and phishing.
The 9 Most Common Tricks Used to Hack Passwords
Want to figure out someone's password? Review your life choices. Learn how to protect your password from hackers instead.
If You Didn’t Change Your Passwords After the LastPass Data Breach, Do It Now
Hackers have been stealing millions of dollars in cryptocurrency, seemingly after the LastPass breach. Here's what you need to know.