Zoom has over 13 million monthly active users, and most of them are oblivious to privacy and security issues this video conferencing app brings.
Bringing up 5 theories that would explain why English language and hackers have a beef.
Nothing is sacred for cybercriminals, especially in times of mass confusion, hardship, and angst. Learn how criminals leverage email to accomplish their goals.
Let’s Encrypt discovered a bug in itss certificate authority authorization software, prompting subscribers to react.
In a classic case of Business Email Compromise (BEC), Barbara Corcoran loses close to $400,000. The scam came through because of a spoofed email address.
Phishing email coming from Amazon is not a surprising story, but the latest Sophos blog post describes a bizarre situation, where hackers failed in fashion.
A classic example of Business Email Compromise recently put a wedge between art dealer Simon C. Dickinson Limited and Rijksmuseum Twenthe.
The World Economic Forum in Davos takes place this week, and while most of us won’t participate, we can and should discuss the information unveiled in the “The Global Risks Report Survey 2020”.
TLSI is essentially a risky trade-off, where you get slightly more insight into what’s leaving and entering your network under the impression that it will protect you from critical data loss or compromise.
The 7th edition of Moldova CyberWeek starts today, and that marks the beginning of the Regional Cyber Resilience Forum held in Chișinău.