Tips & advice


3217 articles

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

As detections of cryptostealers surge across Windows, Android and macOS, it's time for a refresher on how to keep your bitcoin or other crypto safe

Phil Muncaster09 Jan 2025


AI moves to your PC with its own special hardware

AI moves to your PC with its own special hardware

AI moves to your PC with its own special hardware

Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU.

Cameron Camp06 Jan 2025


Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow

Tony Anscombe13 Dec 2024


Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems

Tony Anscombe13 Dec 2024


Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?

Tony Anscombe12 Dec 2024


Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost

Phil Muncaster09 Dec 2024


Scams to look out for this holiday season

Scams to look out for this holiday season

Scams to look out for this holiday season

‘Tis the season to be wary – be on your guard and don’t let fraud ruin your shopping spree

Phil Muncaster28 Nov 2024


My information was stolen. Now what?

My information was stolen. Now what?

My information was stolen. Now what?

The slow and painful recovery process

Aryeh Goretsky19 Nov 2024


What is “Scam Likely”? Putting the phone down on unwanted calls

What is “Scam Likely”? Putting the phone down on unwanted calls

What is “Scam Likely”? Putting the phone down on unwanted calls

Tired of dodging all those 'Scam Likely' calls? Here's what’s behind the label and how to stay one step ahead of phone scammers.

Phil Muncaster18 Nov 2024