Tips & advice


3181 articles

Scams

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

Scams

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys

Roman Cuprik30 May 2023


Digital Security, Business Security

Digital security for the self-employed: Staying safe without an IT team to help

Digital security for the self-employed: Staying safe without an IT team to help

Digital Security, Business Security

Digital security for the self-employed: Staying safe without an IT team to help

Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business

Phil Muncaster24 May 2023


Digital Security

Top 5 search engines for internet-connected devices and services

Top 5 search engines for internet-connected devices and services

Digital Security

Top 5 search engines for internet-connected devices and services

A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet

Camilo Gutiérrez Amaya18 May 2023


Digital Security

Meet “AI”, your new colleague: could it expose your company's secrets?

Meet “AI”, your new colleague: could it expose your company's secrets?

Digital Security

Meet “AI”, your new colleague: could it expose your company's secrets?

Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk

Roman Cuprik17 May 2023


Digital Security

You may not care where you download software from, but malware does

You may not care where you download software from, but malware does

Digital Security

You may not care where you download software from, but malware does

Why do people still download files from sketchy places and get compromised as a result?

Aryeh Goretsky16 May 2023


Kids Online

Why you need parental control software – and 5 features to look for

Why you need parental control software – and 5 features to look for

Kids Online

Why you need parental control software – and 5 features to look for

Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize

Phil Muncaster12 May 2023


Privacy

Turning on stealth mode: 5 simple strategies for staying under the radar online

Turning on stealth mode: 5 simple strategies for staying under the radar online

Privacy

Turning on stealth mode: 5 simple strategies for staying under the radar online

Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details

André Lameiras10 May 2023


Digital Security, Business Security

Creating strong, yet user-friendly passwords: Tips for your business password policy

Creating strong, yet user-friendly passwords: Tips for your business password policy

Digital Security, Business Security

Creating strong, yet user-friendly passwords: Tips for your business password policy

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization

Roman Cuprik04 May 2023


Social Media

Using Discord? Don’t play down its privacy and security risks

Using Discord? Don’t play down its privacy and security risks

Social Media

Using Discord? Don’t play down its privacy and security risks

It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut

Márk Szabó03 May 2023