Digital security


767 articles

Watch out for these traps lurking in search results

Watch out for these traps lurking in search results

Watch out for these traps lurking in search results

Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results

Tomáš Foltýn10 Apr 2025


So your friend has been hacked: Could you be next?

So your friend has been hacked: Could you be next?

So your friend has been hacked: Could you be next?

When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.

Tomáš Foltýn09 Apr 2025


1 billion reasons to protect your identity online

1 billion reasons to protect your identity online

1 billion reasons to protect your identity online

Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.

Phil Muncaster08 Apr 2025


How scammers are exploiting DeepSeek's rise

How scammers are exploiting DeepSeek's rise

How scammers are exploiting DeepSeek's rise

As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing – plus, what else to know before using DeepSeek

Tomáš Foltýn31 Jan 2025


Cybersecurity and AI: What does 2025 have in store?

Cybersecurity and AI: What does 2025 have in store?

Cybersecurity and AI: What does 2025 have in store?

In the hands of malicious actors, AI tools can enhance the scale and severity of all manner of scams, disinformation campaigns and other threats

Phil Muncaster15 Jan 2025


Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

As detections of cryptostealers surge across Windows, Android and macOS, it's time for a refresher on how to keep your bitcoin or other crypto safe

Phil Muncaster09 Jan 2025


AI moves to your PC with its own special hardware

AI moves to your PC with its own special hardware

AI moves to your PC with its own special hardware

Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU.

Cameron Camp06 Jan 2025


Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems

Tony Anscombe13 Dec 2024


Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?

Tony Anscombe12 Dec 2024