The most severe password mistakes

So you’ve come up with a password that’s secure enough. You use it everywhere, and always make sure to change your password every few months. What could go wrong? You might be making one of the most common password mistakes: being lazy with your passwords! Find out in this article what you should avoid – if you’re looking to avoid becoming one of the unlucky ones! While everyone should be …

Learn more →

Microsoft Teams on the radar of hackers

Microsoft Teams is a collaboration tool that was introduced in 2016. Microsoft Teams offers teamwork and communication features such as chat, video conferencing, screen sharing, email, documents, and calendars. However, there have been reports of targeted spear-phishing attacks on Microsoft Teams users’ emails recently. This type of phishing attack is similar to instant message spam. The sender fools the recipient into thinking they are sending an important email or attachment …

Learn more →

Which was the first cyber attack?

Recent years have seen a rise in cyberattacks carried out by governments and non-governmental organizations. These attacks are carried out to steal intellectual property or damage your computer’s operating system. While these attacks may seem like a futuristic concept, the first attack was likely in 2008 during the Russo-Georgian war. Let’s learn more about this first cyberattack and how it paved the way for future attacks! The first cyberattack carried …

Learn more →

A new Android threat attacks two-factor identification

Websites and apps need to come with security measures for users. Two-factor authentication makes sure that an individual has a password to log into the app or website, but this is not enough because hackers are constantly coming up with new ways to hack it. The case The Escoba Trojan attacks the second leg of two-step authentication, considered almost perfectly secure until now: it tries to steal the Google Authenticator …

Learn more →

Mobile phone pests are on the rise

It’s hard to believe the modern-day smartphone or tablet is considered a threat to our security. It is becoming increasingly clear that hackers are actively targeting these devices to exploit their weaknesses and easily steal valuable data. The days when a mobile phone or tablet was considered perfectly safe are slowly disappearing: it is becoming increasingly clear that hackers are now paying close attention to mobile devices. For example, the …

Learn more →

Germany to ban Telegram?

You’ve probably heard of the popular messaging app Telegram, but there’s a chance you don’t know that it might soon be banned in Germany and Brazil. This blog post will explore why governments are clamping down on this app and its meaning for users. You may have heard that the popular encrypted messaging app, Telegram, has been banned in Russia. But while the Russian government is trying to make it …

Learn more →

CryptBox – The secure safe for your data

There are many ways to protect your data in the digital era. Some are more secure than others. Today we’ll look into a new product that’s on Indiegogo called “CryptBox.” Why is it necessary? We’ve all got secrets. Whether it’s big, unspoken secrets like a member of your family’s illness or small things that you keep on your phone just in case – there’s a lot of important information that …

Learn more →

Banks say phishing attacks are increasingly dangerous

Phishing attacks are on the rise, according to a recent study by security provider SecureAuth. One in five of all phishing emails in 2016 were business-to-business (B2B) phishing attacks. The most significant percentage of these attacks came from the financial sector – with one example coming from a fake email purporting to be from the CEO’s assistant requesting money for an urgent project and another from a fake invoice supposedly …

Learn more →

According to Google, two-factor identification works well

The world of cybersecurity is constantly changing and evolving, with innovations always appearing. One of the latest initiatives to protect us from phishing and other forms of cybercrime is two-factor identification (2FA), which can be implemented in many ways and might be something you want to explore. What does two-factor identification (2FA) mean? Two-factor identification is a security measure that adds an extra step to the login process. You might …

Learn more →

Blackmailers are becoming more sophisticated

Digital blackmail, a type of extortion in which the perpetrator uses threats to extract something from the victim, is becoming more and more sophisticated. A copy of your most personal email messages, your social media account passwords, or even your nude photos could all be used to blackmail you. As ransomware viruses become more and more successful and profitable, playing a more prominent and more significant role in the illegal …

Learn more →