The internet offers a vast world of opportunity, connection, and information. But with great power comes great responsibility! Protecting yourself online is more important than ever. This section is your one-stop shop for all things cyber safety. We’ll equip you with the knowledge and tools you need to navigate the digital landscape with confidence. Dive into our library of articles to discover:

  • Essential security practices: Learn the fundamentals of cyber hygiene, from crafting strong passwords to identifying phishing attempts.
  • Shielding your devices: Explore best practices for protecting your computers, phones, and tablets from malware, viruses, and other threats.
  • Staying secure online: Get tips on how to browse safely, manage your online presence, and keep your data private.
  • Understanding cyber threats: Demystify common online dangers like phishing scams, ransomware attacks, and identity theft.
  • Protecting your loved ones: Learn how to keep your family and friends safe online, especially children who are particularly vulnerable.

No matter your technical expertise, we have articles tailored to your needs. Empower yourself with knowledge and become a more secure and responsible digital citizen!

Sort By:
Filter By:
Written For
Topics
Show All
Apple AirTag Zero-Day Weaponizes Trackers

Abdelrazak KhatibAbdelrazak Khatib

02/11/23

Apple AirTag Zero-Day Weaponizes Trackers

In addition the hackers claimed to have accessed the login details of over 3000 Acer...

Read on
Encrypted & Fileless Malware Sees Big Growth

Development TeamDevelopment Team

07/02/24

Encrypted & Fileless Malware Sees Big Growth

VirusTotal’s first Ransomware Activity Report reveals that it received ransomware submissions from 140 different countries...

Read on
Apache Web Server Zero-Day Exposes Sensitive Data

Abdelrazak KhatibAbdelrazak Khatib

02/11/23

Apache Web Server Zero-Day Exposes Sensitive Data

Hardware and electronics giant Acer has suffered a data breach, with hackers claiming they have...

Read on
IP Surveillance Bugs in Axis Gear

Development TeamDevelopment Team

02/11/23

IP Surveillance Bugs in Axis Gear

It’s one of the most serious threats facing organizations today, with the FBI estimating it caused...

Read on
All Source Code Leaked

Abdelrazak KhatibAbdelrazak Khatib

12/12/23

All Source Code Leaked

The newspaper said it found that teachers’ Social Security numbers were contained in the HTML...

Read on
Next Phase in Cyber Warfare

Stephen McClellandStephen McClelland

02/11/23

Next Phase in Cyber Warfare

Prosecutors claim that the group targeted companies in the United States and around the world,...

Read on
The Coming AI Hackers

Abdelrazak KhatibAbdelrazak Khatib

02/11/23

The Coming AI Hackers

Man charged with hack which shared COVID-19 test details in protest against vaccine pass. More...

Read on
Syniverse Hack

Stephen McClellandStephen McClelland

02/11/23

Syniverse Hack

Eleanor Dallaway, the editor of InfoSecurity Magazine, was kind enough to invite me onto her...

Read on
Tracking Stolen Cryptocurrencies

Development TeamDevelopment Team

29/01/24

Tracking Stolen Cryptocurrencies

One of those victims, according to the authorities, was a Boston-based company that says it...

Read on
Check What Information Your Browser Leaks

Abdelrazak KhatibAbdelrazak Khatib

02/11/23

Check What Information Your Browser Leaks

An Acer spokesperson confirmed that the company’s Indian offices had suffered a cyber attack. More...

Read on
Hardening Your VPN

Stephen McClellandStephen McClelland

02/11/23

Hardening Your VPN

A gang of three men has been charged with laundering the proceeds of a Business...

Read on
A Death Due to Ransomware

Stephen McClellandStephen McClelland

02/11/23

A Death Due to Ransomware

Participation at all-time high for CyberFirst summer courses, led by the National Cyber Security Centre...

Read on
Facebook Is Down

Stephen McClellandStephen McClelland

02/11/23

Facebook Is Down

All this and much more is discussed in the latest edition of the award-winning “Smashing...

Read on
Connecting your SOC with mobile teams

Stephen McClellandStephen McClelland

02/11/23

Connecting your SOC with mobile teams

In it we discuss infosecurity rockstars, podcasts, how I would feel if I was stranded...

Read on
Remote work worked, until it didn’t

Stephen McClellandStephen McClelland

24/02/24

Remote work worked, until it didn’t

According to prosecutors, Elkhebri’s alleged role in the plot was to open multiple bank accounts...

Read on
End-to-end encryption and securing data

Abdelrazak KhatibAbdelrazak Khatib

24/02/24

End-to-end encryption and securing data

A married couple are accused of selling nuclear sub secrets, Facebook continues to make young...

Read on
Developer Tools or simply right-clicking on the page

Abdelrazak KhatibAbdelrazak Khatib

02/11/23

Developer Tools or simply right-clicking on the page

In other words, the information was available to anyone with a web browser who happened...

Read on
The hidden threat of business collaboration tools

Stephen McClellandStephen McClelland

02/11/23

The hidden threat of business collaboration tools

Your organization risks compliance and disaster protection shortcomings unless your data management practices catch up...

Read on
Showing 18 of 18 Results