Mass data collection is embraced by big tech companies not only to benefit from customers, but also to identify competition that could threaten the status quo.
Simulated phishing can be helpful, but it can also do more harm than good. This blog post highlights common mistakes that occur during user awareness tests.
Zoom has over 13 million monthly active users, and most of them are oblivious to privacy and security issues this video conferencing app brings.
Bringing up 5 theories that would explain why English language and hackers have a beef.
Nothing is sacred for cybercriminals, especially in times of mass confusion, hardship, and angst. Learn how criminals leverage email to accomplish their goals.
Let’s Encrypt discovered a bug in itss certificate authority authorization software, prompting subscribers to react.
In a classic case of Business Email Compromise (BEC), Barbara Corcoran loses close to $400,000. The scam came through because of a spoofed email address.
Phishing email coming from Amazon is not a surprising story, but the latest Sophos blog post describes a bizarre situation, where hackers failed in fashion.
A classic example of Business Email Compromise recently put a wedge between art dealer Simon C. Dickinson Limited and Rijksmuseum Twenthe.
The World Economic Forum in Davos takes place this week, and while most of us won’t participate, we can and should discuss the information unveiled in the “The Global Risks Report Survey 2020”.