10 essential rules for (perfect) safety

When it comes to staying safe on the internet, there are many issues you need to watch out for. Viruses, malicious links and files, and phishing attempts are some of the most common ways of compromising your security. So, whether you’re using a computer or a phone, check out these 10 essential rules for cybersecurity! Apply automatic updates Without up-to-date patching updates, no adequate protection can be achieved since malicious …

Learn more →

How to defend yourself against hackers

What do you know about hackers? They can be strangers, people you know, in person, or online. They’re in it for the money, power, fame, or even just to learn how to break things. Technology has made our lives both safer and more vulnerable. We are safer because we can easily find directions, contact someone on the other side of the globe, or order a pizza precisely when we want …

Learn more →

How hackers work

As hackers have become more sophisticated and better-funded, many of us find ourselves asking how we can defend ourselves against them. This is a question that will only grow in urgency over time. In this blog post, we want to give you an overview of how hackers work. Not just to show you what they’re capable of but also to help you understand what you can do better to protect …

Learn more →

10 tips for safe online banking

There are few things more important and valuable than your money. One of the most common ways to lose money in the modern age is through identity theft. And while this threat is no doubt scary, it’s also preventable. It’s important to take precautions and follow some basic guidelines to make sure that you do everything you can to protect what you have. In this article, we will outline 10 …

Learn more →

Deloitte’s mail system hacked

Hacking has been a known issue for many years, with new vulnerabilities and hacks being discovered almost daily. In this article, the author details just how vulnerable Deloitte’s email system was – and how they managed to quickly respond in order to fix the issue. The case Consulting firm Deloitte uses a cloud-based mail system to allow employees to easily access emails from anywhere globally and on any device. Unfortunately, …

Learn more →

Samsung smart TVs: the Tizen bleeds from many wounds

Samsung’s smart TVs have a lot of security flaws, but they’ve been around for a while. Samsung has a long history of making chips and devices, which have often had vulnerabilities in their software. The case Tizen, which runs on Samsung smart TVs and wearable devices, has a lot of security flaws: experts have discovered 40 so-called 0-day vulnerabilities. The open-source system is used by at least 30 million devices …

Learn more →