Tips & advice


3181 articles

COVID-19, Business Security

Do back offices mean backdoors?

Do back offices mean backdoors?

COVID-19, Business Security

Do back offices mean backdoors?

War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture

James Shepperd29 Jun 2022


Cybercrime

5 common ways hackers steal credit card details

5 common ways hackers steal credit card details

Cybercrime

5 common ways hackers steal credit card details

Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe

Phil Muncaster27 Jun 2022


Privacy

Crypto mixers: What are they and how are they used?

Crypto mixers: What are they and how are they used?

Privacy

Crypto mixers: What are they and how are they used?

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money

Sol González20 Jun 2022


Malware

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

Malware

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?

Rene Holt16 Jun 2022


Digital Security

RSA – APIs, your organization’s dedicated backdoors

RSA – APIs, your organization’s dedicated backdoors

Digital Security

RSA – APIs, your organization’s dedicated backdoors

API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly

Cameron Camp10 Jun 2022


Privacy

RSA – Creepy real-world edition

RSA – Creepy real-world edition

Privacy

RSA – Creepy real-world edition

Digital fiddling somehow got mixed up in a real war

Cameron Camp09 Jun 2022


Digital Security

RSA – Digital healthcare meets security, but does it really want to?

RSA – Digital healthcare meets security, but does it really want to?

Digital Security

RSA – Digital healthcare meets security, but does it really want to?

Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission

Cameron Camp08 Jun 2022


Privacy

RSA – Spot the real fake

RSA – Spot the real fake

Privacy

RSA – Spot the real fake

How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer

Cameron Camp07 Jun 2022


Kids Online

Talking to children about the internet: A kid’s perspective

Talking to children about the internet: A kid’s perspective

Kids Online

Talking to children about the internet: A kid’s perspective

A 14-year-old shares his thoughts about technology and the potential privacy and security implications of the internet

André Lameiras01 Jun 2022