Tips & advice


3202 articles

Digital Security, Ransomware, Cybercrime

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Digital Security, Ransomware, Cybercrime

Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Current LLMs are just not mature enough for high-level tasks

Tony Anscombe12 Aug 2023


Critical Infrastructure, Malware

Black Hat 2023: Cyberwar fire-and-forget-me-not

Black Hat 2023: Cyberwar fire-and-forget-me-not

Critical Infrastructure, Malware

Black Hat 2023: Cyberwar fire-and-forget-me-not

What happens to cyberweapons after a cyberwar?

Cameron Camp11 Aug 2023


Scams, Cybercrime, Digital Security

Time is money, and online game scammers have lots of it

Time is money, and online game scammers have lots of it

Scams, Cybercrime, Digital Security

Time is money, and online game scammers have lots of it

Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and why would anyone want to target gamers?

Márk Szabó07 Aug 2023


Digital Security, Privacy

Fingerprints all over: Can browser fingerprinting increase website security?

Fingerprints all over: Can browser fingerprinting increase website security?

Digital Security, Privacy

Fingerprints all over: Can browser fingerprinting increase website security?

Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?

Márk Szabó03 Aug 2023


Scams, Business Security

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

Scams, Business Security

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.

Raj Kapoor02 Aug 2023


Digital Security, We Live Progress, Privacy

Quantum computing: Will it break crypto security within a few years?

Quantum computing: Will it break crypto security within a few years?

Digital Security, We Live Progress, Privacy

Quantum computing: Will it break crypto security within a few years?

Current cryptographic security methods watch out - quantum computing is coming for your lunch.

Cameron Camp01 Aug 2023


Internet of Things, Digital Security, Privacy

Gathering dust and data: How robotic vacuums can spy on you

Gathering dust and data: How robotic vacuums can spy on you

Internet of Things, Digital Security, Privacy

Gathering dust and data: How robotic vacuums can spy on you

Mitigate the risk of data leaks with a careful review of the product and the proper settings.

Roman Cuprik26 Jul 2023


Scams

Dear all, What are some common subject lines in phishing emails?

Dear all, What are some common subject lines in phishing emails?

Scams

Dear all, What are some common subject lines in phishing emails?

Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency.

Roman Cuprik25 Jul 2023


Scams

8 common work-from-home scams to avoid

8 common work-from-home scams to avoid

Scams

8 common work-from-home scams to avoid

That ‘employer’ you’re speaking to may in reality be after your personal information, your money or your help with their illegal activities

Phil Muncaster20 Jul 2023