Google’s assistance is undeniable, but it comes with a hidden fee. Data collection and user profiling are not shocking now, but how exactly did we get here?
Mass data collection is embraced by big tech companies not only to benefit from customers, but also to identify competition that could threaten the status quo.
Simulated phishing can be helpful, but it can also do more harm than good. This blog post highlights common mistakes that occur during user awareness tests.
Zoom has over 13 million monthly active users, and most of them are oblivious to privacy and security issues this video conferencing app brings.
Bringing up 5 theories that would explain why English language and hackers have a beef.
Nothing is sacred for cybercriminals, especially in times of mass confusion, hardship, and angst. Learn how criminals leverage email to accomplish their goals.
Let’s Encrypt discovered a bug in itss certificate authority authorization software, prompting subscribers to react.
In a classic case of Business Email Compromise (BEC), Barbara Corcoran loses close to $400,000. The scam came through because of a spoofed email address.
Phishing email coming from Amazon is not a surprising story, but the latest Sophos blog post describes a bizarre situation, where hackers failed in fashion.
A classic example of Business Email Compromise recently put a wedge between art dealer Simon C. Dickinson Limited and Rijksmuseum Twenthe.