What is Threat Hunting and why is it necessary?
Companies are increasingly aware of the importance of creating detection and hunting capacities that help to keep their business’s future from being put at risk.…
Cryptocurrency fraud is the exception, not the rule
Cryptocurrencies like Bitcoin and Ethereum have become associated with .
Study: Americans Don’t Understand Basic Internet Safety
In our modern world, the internet is integral to daily life. The internet stores our files connects us with others and holds sensitive data like bank account credentials. So why don’t we treat internet security like we would real-life safety?
The risk of using phone numbers as authenticators for sensitive information
Find out how using mobile phones to authenticate sensitive information and accounts can pose a risk to your company’s cybersecurity.
Which is the safest smart speaker?
Smart speakers – like any internet-connected device – could be a potential security problem. So which is the safest?
Beware this malware: it can even survive operating systems being reinstalledÂ
LoJax is a piece of malware that is able to survive an operating system being reinstalled making it especially dangerous for companies and institutions.
Marketers develop a new sneaky tracking technique
Digital marketers are desperate to know everything they can about you – and they’re tracking your phone to do it.